Search Results - (( case detection method algorithm ) OR ( based simulation based algorithm ))

Refine Results
  1. 1

    DEVELOPMENT OF OE-BASED BROWN-FORSYTHE TEST ALGORITHM FOR CONTROL VALVE STICTION DETECTION by JOLENE DIANDRA, JAMES

    Published 2018
    “…Case Study 1 studies three strengths of stiction, which are no stiction (Base Case 1), weak stiction (Case 1.1) and strong stiction (Case 1.2), while Case Study 2 investigates the presence of several sources of process nonlinearities in control loops, which include well-tuned controller (Base Case 2), tight-tuned controller (Case 2.1), presence of external disturbances (Case 2.2) and presence of stiction (Case 2.3).As a result, the proposed method is able to successfully detect and distinguish presence of stiction for both types of inputs at 95% confidence level. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  2. 2

    Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed by Aneesa Ali, Ali Saeed

    Published 2017
    “…Case study evaluation was conducted based on three industrial open source case studies in order to evaluate empirically the significant of the performance of the proposed method. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network by Mohammad Azmi Ridwan, Dr.

    Published 2023
    “…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
    text::Thesis
  4. 4

    FPGA Implementation of Multi-User Detection Genetic Algorithm Tool for SDMA-OFDM Systems by Alansi, M., Elshafiey, I., Al-Sanie, A., Mabrouk, A.

    Published 2016
    “…Robust multi-user detection (MUD) methods based on space division multiple access (SDMA) techniques are essential to efficiently exploit the electromagnetic spectrum. …”
    Get full text
    Get full text
    Article
  5. 5

    Fault diagnostic algorithm for precut fractionation column by Heng, H. Y., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2004
    “…The fault diagnostic algorithm is supported by the process history based method and developed by using Borland C++ Builder 6.0. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Failure detection analysis of grid-connected photovoltaic system using an improved comparative based method / Fatin Azirah Mohd Shukor by Mohd Shukor, Fatin Azirah

    Published 2022
    “…Numerous studies have reported FD analysis algorithm using comparative based method (CBM), but limitedly demonstrate the FD analysis sequence that will finally determine the type of failure occurred in the GCPV system. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A simple model-free butterfly shape-based detection (BSD) method integrated with deep learning CNN for valve stiction detection and quantification by Kamaruddin, B., Zabiri, H., Mohd Amiruddin, A.A.A., Teh, W.K., Ramasamy, M., Jeremiah, S.S.

    Published 2020
    “…Based on the 15 benchmark industrial loops with stiction, the proposed BSD-CNN quantification algorithm has shown reasonable accuracy when compared to other published quantification methods in literature. …”
    Get full text
    Get full text
    Article
  8. 8

    Vision-Based Autonomous Vehicle Driving Control System by Isa, Khalid

    Published 2005
    “…However, this study only focuses on driving control system that based on vision sensor. Therefore, this study presents a simulation system with Graphical User Interface (GUI) to simulate and analyse the driving control for autonomous vehicle that based on video taken fiom the vehicle during driving on highway, by using MATLAB programming. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower by Gatea, Sarah Jabbar

    Published 2018
    “…The modal frequencies of the tower are evaluated under various conditions of damage in concrete and connection in different parts of the tower by using finite element simulation. The results are used to develop the hybrid learning algorithm based on the AdaBoost, Bagging, and RUSBoost methods to predict the damage in the tower based on dynamic frequency domain. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Hybrid moth flame optimization mppt algorithm for accurate real-time tracking under partially shaded photovoltaic system by Tiong, Meng Chung

    Published 2021
    “…All four MPPT methods were simulated and real-time evaluated under 10 constant irradiance test cases, 30 dynamic irradiance test cases and 100 partial shaded irradiance test cases. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…In the past decades, machine learning methods have been successfully used in several intrusion detection methods because of their ability to discover and detect novel attacks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    A New Method Of Speed Sensorless Control For Permanent Magnet Synchronous Motor by Samat, Ahmad Asri Abd

    Published 2019
    “…DSpace is deployed for algorithm implementation. The analysis is carried out by comparing the simulation and hardware implementation in different cases of motor conditions. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Fault detection and diagnosis using correlation coefficients by Mak, Weng Yee

    Published 2005
    “…This research is to formulate a FDD algorithm based on MSPC via correlation coefficients. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Survival modelling, missing values and frailty with application to cervical cancer data / Nuradhiathy Abd Razak by Nuradhiathy, Abd Razak

    Published 2016
    “…Overall, the EM algorithm by method of weight performs well compared to other methods. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Modelling of intelligent intrusion detection system: making a case for snort by Olanrewaju, Rashidah Funke, Ku zahir, Ku Nor Afiza, Asnawi, Ani Liza, Sanni, Mistura Laide, Ahmed, Abdulkadir Adekunle

    Published 2018
    “…The data collected was used to train the Multilayer Feedforward Neural Network (MLFNN) with Back-propagation (BP) algorithm. This MLFNN with BP algorithm was simulated using MATLAB software. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17
  18. 18

    New CFAR algorithm and circuit development for radar receiver by Kamal, Mustafa Subhi

    Published 2020
    “…All these algorithms are simulated using MATLAB and applied them to three different clutter models that represent different environment cases. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    A voting-based hybrid machine learning approach for fraudulent financial data classification / Kuldeep Kaur Ragbir Singh by Kuldeep Kaur , Ragbir Singh

    Published 2019
    “…Standard base machine learning algorithms, which include a total of twelve individual methods as well as the AdaBoost and Bagging methods, are firstly used. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Embedded wearable EEG seizure detection in ambulatory state by Shakir, M., Malik, A.S., Kamel, N., Qidwai, U.

    Published 2014
    “…This paper describes a classification method is presented using a Fuzzy System to detect the occurrences of Partial Seizures from Epilepsy data, which can be implemented in any embedded system as a wearable detection system. …”
    Get full text
    Get full text
    Article