Search Results - (( case generation method algorithm ) OR ( parameter detection method algorithm ))

Refine Results
  1. 1

    DEVELOPMENT OF OE-BASED BROWN-FORSYTHE TEST ALGORITHM FOR CONTROL VALVE STICTION DETECTION by JOLENE DIANDRA, JAMES

    Published 2018
    “…Lastly, it is compared with other published stiction detection methods, where it performs as efficient and even better than other methods.…”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  2. 2

    Exploration and Exploitation Mechanism in Pairwise Test Case Generation: A Systematic Literature Review by Yahaya, Muhammad Sabo, Hashim, Ahmad Sobri B., Oluwagbemiga Balogun, Abdullateef, Aminu Muazu, Aminu, Sabo Usman, Fatima, Adamu Aliyu, Dahiru, Uwaisu Muhammad, Abdullahi

    Published 2025
    “…This review systematically examines the role of metaheuristic algorithms in pairwise test case generation, focusing on their exploration and exploitation mechanisms to address local optima challenges. …”
    Get full text
    Get full text
    Article
  3. 3

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…Hence, the main objective of this research is to address the feasibility and demonstrate the potential of DM in SHM, as well as apply DM technology which includes machine learning, artificial intelligence and statistical methods for damage detection of a lab-scale slab-on-girder bridge and four steel I beams structures using dynamic parameters of structures. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Em Approach on Influence Measures in Competing Risks Via Proportional Hazard Regression Model by Elfaki, Faiz. A. M.

    Published 2000
    “…Unlike the residuals, the perturbation method of Cook's distance and the likelihood distance were effective in the detection of observations that have influenced on the parameter estimates. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Adaptive Control of Weld Penetration and Trajectory for Robotic GTAW by Sadeghi, Mir Bahram H.

    Published 1996
    “…The results showed that the misalignment of the progressive heat affected zone which is adjacent to the weld puddle can be detected and used for control of the weld trajectory. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Parametric and Semiparametric Competing Risks Models for Statistical Process Control with Reliability Analysis by Mohamed Elfaki, Faiz Ahmed

    Published 2004
    “…The Expectation Maximization (EM) algorithm is utilized to obtain the estimate of the parameters in the models. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor by Adilah, Abdul Ghapor

    Published 2017
    “…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam by Fayyadh, M.M., Abdul Razak, H.

    Published 2011
    “…This study verifies the use of the proposed weighting method by Fayyadh and Abdul Razak (2011a) for damage detection algorithms applied on cracked steel beam. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…These results indi�cate that the proposed method can improve the RAN learning algorithm towards the large-scale stream data processing. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Improved intrusion detection algorithm based on TLBO and GA algorithms by Aljanabi, Mohammad, Mohd Arfian, Ismail

    Published 2021
    “…The NTLBO was proposed in this paper as an FSS mechanism; its algorithm-specific, parameter-less concept (which requires no parameter tuning during an optimization) was explored. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Test case minimization applying firefly algorithm by Hashim, Nor Laily, Dawood, Yasir Salman

    Published 2018
    “…The proposed test case minimization method has the following steps: provide weight to the paths, calculate path coverage for each path, transform an immediate graph into an adjacency matrix, which later is used to apply firefly algorithm and generate optimal test cases. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Outlier detection in circular regression model using minimum spanning tree method by Nur Faraidah, Muhammad Di, Siti Zanariah, Satari, Roslinazairimah, Zakaria

    Published 2019
    “…The existence of outliers in a circular regression model can lead to many errors, for example in inferences and parameter estimations. Therefore, this study aims to develop new algorithms that can detect outliers by using the minimum spanning tree method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali by Wan Ghazali, Wan Nurdayini Batrisyia

    Published 2024
    “…The key concern of this thesis is to determine the influence of flying height parameters on crack detection using UAVs. Looking at the current scenario of development and the age of the structures in urban areas, there is a high significance of efficient and accurate building inspection methods. …”
    Get full text
    Get full text
    Student Project
  20. 20

    Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed by Aneesa Ali, Ali Saeed

    Published 2017
    “…This thesis presents a method for generating feasible test cases from UML state machine models with OCL constraints. …”
    Get full text
    Get full text
    Get full text
    Thesis