Search Results - (( based detection method algorithm ) OR ( variable equations using algorithm ))

Refine Results
  1. 1

    Block multistep methods for solving first order retarded and neutral delay differential equations by Abdul Aziz, Nurul Huda

    Published 2015
    “…The investigation begins by solving the retarded delay differential equations (RDDE) using 1-point multistep method and it then extended to the 2-point and 3-point block multistep methods. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Robust Estimation Methods And Outlier Detection In Mediation Models by Fitrianto, Anwar

    Published 2010
    “…Mediation models refer to the relationships among three variables: an independent variables (IV), a potential mediating variable (M), and a dependent variable (DV). …”
    Get full text
    Get full text
    Thesis
  3. 3

    Power System State Estimation In Large-Scale Networks by NURSYARIZAL MOHD NOR, NURSYARIZAL

    Published 2010
    “…The Weighted Least Squares (WLS) method is the most popular technique of SE. This thesis provides solutions to enhance the WLS algorithm in order to increase the performance of SE. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Adaptive Control of Weld Penetration and Trajectory for Robotic GTAW by Sadeghi, Mir Bahram H.

    Published 1996
    “…Weld process parameters such as base current and time, pulse current and time, electrode tip to workpiece distance, filler traveling speed, torch speed and workpiece thickness were used for finding the equations which describe the interrelationship between the aforementioned variables and penetration depth as well as bead width. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Study on numerical solution of a variable order fractional differential equation based on symmetric algorithm by Liu, Jingrui, Pan, Dongyang

    Published 2019
    “…A fully symmetric classification of the boundary value problem for a class of fractional differential equations with variable sequences is determined by using a fully symmetric differential sequence sorting algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Model predictive control based on Lyapunov function and near state vector selection of four-leg inverter / Abdul Mannan Dadu by Abdul Mannan, Dadu

    Published 2018
    “…The proposed control algorithm takes advantage of a predefined Lyapunov control law which minimizes the required calculation time by the Lyapunov model equations just once in each control loop to predict future variables. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    SURE-Autometrics algorithm for model selection in multiple equations by Norhayati, Yusof

    Published 2016
    “…Thus, this study aims to develop an algorithm for model selection in multiple equations focusing on seemingly unrelated regression equations (SURE) model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Edge Detection Algorithm For Image Processing Of Search And Rescue Robot by A/L Sivem, Prasanthran

    Published 2016
    “…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
    Get full text
    Get full text
    Final Year Project
  9. 9
  10. 10
  11. 11

    Machine learning algorithms in context of intrusion detection by Mehmood, T., Rais, H.B.Md.

    Published 2016
    “…Asymmetrically, anomaly based detection method can detect novel attacks but it has high false positive rate. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Optimised content-social based features for fake news detection in social media using text clustering approach by Yahya, Adnan Hussein Ali

    Published 2025
    “…In general, the process of fake news detection was conducted in two different phases, the topic detection phase using a graph-based unsupervised clustering method based on HFPA and Markov Clustering Algorithm (MCL) called (HFPA-MCL) and the fake news detection phase using an unsupervised clustering method based on K-means algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Variable order variable stepsize algorithm for solving nonlinear Duffing oscillator by Rasedee, Ahmad Fadly Nurullah, Ishak, Norizarina, Hamzah, Siti Raihana, Ijam, Hazizah Mohd, Suleiman, Mohamed, Ibrahim, Zarina Bibi, Sathar, Mohammad Hasan Abdul, Ramli, Nur Ainna, Kamaruddin, Nur Shuhada

    Published 2017
    “…In this research, a numerical approximation for solving the Duffing oscillator directly is introduced using a variable order stepsize (VOS) algorithm coupled with a backward difference formulation. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17
  18. 18

    Weighting method for modal parameter based damage detection algorithms by Fayyadh, M.M., Abdul Razak, H.

    Published 2011
    “…This study proposes weighting method for damage detection algorithms based on the bending mode shapes for beam structures. …”
    Get full text
    Get full text
    Article
  19. 19

    Numerical algorithm of block method for general second order ODEs using variable step size by Nazreen Waeleh, Zanariah Abdul Majid

    Published 2017
    “…This paper outlines an alternative algorithm for solving general second order ordinary differential equations (ODEs). …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20