Search Results - ((((restoration algorithm) OR (selection algorithm))) OR (detection algorithm))

Refine Results
  1. 1

    Inverse problem in image processing: Image restoration by Wong, Yen Khai

    Published 2023
    “…The results show that the proposed MB-ES algorithm achieves remarkable performance in detecting the stopping point that closely resembles the ground truth. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar by Seyed Alireza, Ravanfar

    Published 2017
    “…This resulted in the high accuracy of the damage detection algorithm. The second proposed method seeks to identify damage in the structural parameters of linear and nonlinear systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Partitioning Detection and Connectivity Restoration Algorithm for Wireless Sensor Actor Networks by Imran, Muhammad, Younis, Mohamed, Md Said, Abas, Hasbullah, Halabi

    Published 2010
    “…We present PCR, a hybrid novel distributed partitioning detection and connectivity restoration algorithm. It proactively identifies critical actors based on local topological information and designates appropriate backup nodes to handle their failure. …”
    Get full text
    Get full text
    Article
  4. 4

    Study of fuzzy based control algorithm for dynamic voltage restorer by Taghizadeh S., Tan N.M.L., Karimi-Ghartemani M.

    Published 2023
    “…Algorithms; Control systems; Damage detection; Power quality; Voltage regulators; Voltage stabilizing circuits; Battery lifetime; DVR; Dynamic voltage restorer (DVR); Electrical components; EPLL; Improved control algorithms; Phase lock loop (PLL); Sensitive loads; Fuzzy logic…”
    Article
  5. 5

    Partitioning detection and connectivity restoration algorithm for WSAN by Muhammad, Imran, Md Said, Abas, Hasbullah, Halabi, Younis, Mohammed

    Published 2010
    “…This paper presents PCR, a novel distributed partitioning detection and connectivity restoration algorithm. PCR proactively identifies critical actors based on local topological information and designate appropriate backup nodes (preferably non-critical) to handle their failure. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    Mitigation of voltage sags/swells using dynamic voltage restorer based on DQO algorithm / Mohamad Shahrun Azizan by Azizan, Mohamad Shahrun

    Published 2009
    “…Voltage swells is a sudden increasing of supply voltage in rms voltage at network fundamental frequency cause by energizing large capacitor or switching off a large inductive load. A dynamic voltage restore based on the dqo algorithm is discussed. The control scheme is very effective to detect any disturbance in low voltage distribution systems. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Restoration of missing data in old archives based on genetic algorithm by Khammar, Mohammad Reza, Saripan, M. Iqbal, Marhaban, Mohammad Hamiruce, Ishak, Asnor Juraiza, Zolfaghari, Fateme

    Published 2014
    “…After applying most algorithms to detect the position of blotches and also scratch which is another type of defect in the old media, in each frame of video, it is essential to correct them, in other words, we should fill the missing data with reasonable values. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Blotch removal using multi-level scanning, shape analysis, and meta heuristic techniques by Khammar, Mohammad Reza

    Published 2015
    “…This post processing algorithm was provided based on a multi-level scanning and shape analysis which was presented for the better performance of high correct detection and lower false alarms for each given threshold. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Evaluation of feature selection algorithm for android malware detection by Mazlan, Nurul Hidayah, A Hamid, Isredza Rahmi

    Published 2018
    “…This paper synthesizes an evaluation of feature selection algorithm by utilizing Term Frequency Inverse Document Frequency (TF-IDF) as the main algorithm in Android malware detection. …”
    Get full text
    Article
  11. 11

    Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection by Almazini, Hussein

    Published 2022
    “…Thus, this study proposes an enhanced binary grey wolf optimiser (EBGWO) algorithm for FS in anomaly detection to overcome the algorithm issues. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal by Zainal, Mohamad Izwan

    Published 2022
    “…Later, this MOCSSA is applied on service restoration to ensure the proposed algorithm technique is suitable in selecting the optimal switches for supply recovery after the line section is isolated from the system either by forced outage or planned outage purposes. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Feature selection to enhance android malware detection using modified term frequency-inverse document frequency (MTF-IDF) by Mazlan, Nurul Hidayah

    Published 2019
    “…This research synthesizes an evaluation of feature selection algorithm by utilizing Term Frequency-Inverse Document Frequency (TF-IDF) as the main algorithm in Android malware detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Soft robotic glove system controlled with amplitude independent muscle activity detection algorithm by using single sEMG channel by Hameed, Husamuldeen Khalid, Wan Hasan, Wan Zuha, Shafie, Suhaidi, Ahmad, Siti Anom, Jaafar, Haslina

    Published 2018
    “…The algorithm employs two amplitude independent and computations efficient methods to detect weak and noisy muscle activities from surface electromyography (sEMG) signal obtained by a single channel located on the forearm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Edge Detection Algorithm For Image Processing Of Search And Rescue Robot by A/L Sivem, Prasanthran

    Published 2016
    “…Subsequently, Canny edge detection algorithm is selected as an efficient algorithm based on the comparison made and it is further used in this project. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Improved intrusion detection algorithm based on TLBO and GA algorithms by Aljanabi, Mohammad, Mohd Arfian, Ismail

    Published 2021
    “…The proposed method combined the New Teaching-Learning-Based Optimization Algorithm (NTLBO), Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) NTLBO algorithm with supervised machine learning techniques for Feature Subset Selection (FSS). …”
    Get full text
    Get full text
    Get full text
    Article