Search Results - (( based detection method algorithm ) OR ( variable equations using algorithm ))
Search alternatives:
- variable equations »
- method algorithm »
- based detection »
- using algorithm »
-
1
Block multistep methods for solving first order retarded and neutral delay differential equations
Published 2015“…The investigation begins by solving the retarded delay differential equations (RDDE) using 1-point multistep method and it then extended to the 2-point and 3-point block multistep methods. …”
Get full text
Get full text
Thesis -
2
Robust Estimation Methods And Outlier Detection In Mediation Models
Published 2010“…Mediation models refer to the relationships among three variables: an independent variables (IV), a potential mediating variable (M), and a dependent variable (DV). …”
Get full text
Get full text
Thesis -
3
Power System State Estimation In Large-Scale Networks
Published 2010“…The Weighted Least Squares (WLS) method is the most popular technique of SE. This thesis provides solutions to enhance the WLS algorithm in order to increase the performance of SE. …”
Get full text
Get full text
Thesis -
4
Adaptive Control of Weld Penetration and Trajectory for Robotic GTAW
Published 1996“…Weld process parameters such as base current and time, pulse current and time, electrode tip to workpiece distance, filler traveling speed, torch speed and workpiece thickness were used for finding the equations which describe the interrelationship between the aforementioned variables and penetration depth as well as bead width. …”
Get full text
Get full text
Thesis -
5
Study on numerical solution of a variable order fractional differential equation based on symmetric algorithm
Published 2019“…A fully symmetric classification of the boundary value problem for a class of fractional differential equations with variable sequences is determined by using a fully symmetric differential sequence sorting algorithm. …”
Get full text
Get full text
Get full text
Article -
6
Model predictive control based on Lyapunov function and near state vector selection of four-leg inverter / Abdul Mannan Dadu
Published 2018“…The proposed control algorithm takes advantage of a predefined Lyapunov control law which minimizes the required calculation time by the Lyapunov model equations just once in each control loop to predict future variables. …”
Get full text
Get full text
Get full text
Thesis -
7
SURE-Autometrics algorithm for model selection in multiple equations
Published 2016“…Thus, this study aims to develop an algorithm for model selection in multiple equations focusing on seemingly unrelated regression equations (SURE) model. …”
Get full text
Get full text
Get full text
Thesis -
8
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
Get full text
Get full text
Final Year Project -
9
-
10
Parallel method using MPI for solving large systems of delay differential equations
Published 2012Get full text
Get full text
Conference or Workshop Item -
11
Machine learning algorithms in context of intrusion detection
Published 2016“…Asymmetrically, anomaly based detection method can detect novel attacks but it has high false positive rate. …”
Get full text
Get full text
Conference or Workshop Item -
12
Optimised content-social based features for fake news detection in social media using text clustering approach
Published 2025“…In general, the process of fake news detection was conducted in two different phases, the topic detection phase using a graph-based unsupervised clustering method based on HFPA and Markov Clustering Algorithm (MCL) called (HFPA-MCL) and the fake news detection phase using an unsupervised clustering method based on K-means algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
14
Variable order variable stepsize algorithm for solving nonlinear Duffing oscillator
Published 2017“…In this research, a numerical approximation for solving the Duffing oscillator directly is introduced using a variable order stepsize (VOS) algorithm coupled with a backward difference formulation. …”
Get full text
Get full text
Get full text
Article -
15
Variable order variable stepsize algorithm for solving nonlinear Duffing oscillator
Published 2024journal::journal article -
16
-
17
-
18
Weighting method for modal parameter based damage detection algorithms
Published 2011“…This study proposes weighting method for damage detection algorithms based on the bending mode shapes for beam structures. …”
Get full text
Get full text
Article -
19
Numerical algorithm of block method for general second order ODEs using variable step size
Published 2017“…This paper outlines an alternative algorithm for solving general second order ordinary differential equations (ODEs). …”
Get full text
Get full text
Get full text
Article -
20
