Search Results - (( data detection method algorithm ) OR ( data simulation optimization algorithm ))

Refine Results
  1. 1

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…Moreover, the proposed algorithm result are compared to some common algorithms such as the A* algorithm, Probabilistic Road Map, RRT, Bi-directional RRT, and Laser Simulator algorithm to demonstrate its effectiveness. …”
    Get full text
    Thesis
  2. 2

    Road damage detection for autonomous driving vehicles using YOLOv8 and salp swarm algorithm by Nik Ahmad Farihin, Mohd Zulkifli, Zuriani, Mustaffa, Mohd Herwan, Sulaiman

    Published 2025
    “…Consequently, this paper proposes a method to improve the detection accuracy of You Only Look Once version 8 (YOLOv8) using Salp Swarm Algorithm (SSA) for hyperparameter optimization, focusing on eight key parameters. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower by Gatea, Sarah Jabbar

    Published 2018
    “…Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification by Abd Samad, Md Fahmi

    Published 2011
    “…A deterministic mutation-based algorithm is introduced to overcome this problem. Identification studies using NARX (Nonlinear AutoRegressive with eXogenous input) models employing simulated systems and real plant data are used to demonstrate that the algorithm is able to detect significant variables and terms faster and to select a simpler model structure than other well-known EC methods.…”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed by Aneesa Ali, Ali Saeed

    Published 2017
    “…In order to generate optimal data to satisfy whole constraints in the feasible path, new method with SBTs is necessary to satisfy the whole constraints at the same time of the whole path executing. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    A study on channel coding for 5G / Xu Wei by Xu , Wei

    Published 2019
    “…In addition, the performances of Polar code under different decoding algorithms and different construction method are simulated and compared. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks / Wang Jie ... [et al.] by Wang, Jie, Mohd. Shah, Mohd. Kamal, Choong, Wai Heng, Al-Azad, Nahiyan

    Published 2024
    “…Traditional BP networks face challenges, including parameter determination and slow convergence, addressed through genetic algorithms' global search capabilities. Simulated data are generated using ANSYS software by using models of semi-circular defects in steel pipes, producing magnetic leakage signals of varying intensities. …”
    Get full text
    Get full text
    Article
  12. 12

    Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks by Wang Jie, Mohd. Kamal Mohd. Shah, Choong Wai Heng, Nahiyan Al-Azad

    Published 2024
    “…Traditional BP networks face challenges, including parameter determination and slow convergence, addressed through genetic algorithms' global search capabilities. Simulated data are generated using ANSYS software by using models of semi-circular defects in steel pipes, producing magnetic leakage signals of varying intensities. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    FPGA Implementation of Multi-User Detection Genetic Algorithm Tool for SDMA-OFDM Systems by Alansi, M., Elshafiey, I., Al-Sanie, A., Mabrouk, A.

    Published 2016
    “…Resource utilization is optimized, and the total number of clock cycles required is found to be 15 initially, in addition to one clock cycle per member of algorithm population. …”
    Get full text
    Get full text
    Article
  14. 14

    An efficient unknown detection approach for RFID data stream management system by Siti Salwani, Yaacob, Hairulnizam, Mahdin, Wijayanto, Inung, Muhammad Aamir, -, Mohd Izham, Mohd Jaya, Nabilah Filzah, Mohd Radzuan, Al Fahim, Mubarak Ali

    Published 2025
    “…A novel algorithm called SWOR (Sliding Window XOR-based Detection) is introduced, specifically designed to identify unknown tags within RFID data streams. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Parameter estimation of multicomponent transient signals using deconvolution and ARMA modelling techniques by Salami, Momoh Jimoh Emiyoka, Sidek, Shahrul Na'im

    Published 2003
    “…The frequency domain method of analysis that involves Gardner transformation and conventional inverse filtering often degrades the quality of deconvolved data, leading to inaccurate results, especially for noisy data. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Robust estimation methods for fixed effect panel data model having block-concentrated outliers by Abu Bakar @ Harun, Nor Mazlina

    Published 2019
    “…Not much research has been done on method of detecting HLPs for panel data. Hence, we have proposed Robust Diagnostic-F (RDF) to remedy the problem of masking and swamping in detecting HLPs. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation by Ahmadipour, Masoud

    Published 2019
    “…Non detection zone decreases to around zero and the proposed method has the ability to detect islanding up to 0.1% power mismatch. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Novel algorithm for mobile robot path planning in constrained environment by Muhammad, Aisha, Ali, Mohammed A. H., Turaev, Sherzod, Shanono, Ibrahim Haruna, Hujainah, Fadhl, Mohd Zubir, Mohd Nashrul, Faiz, Muhammad Khairi, Mohd Faizal, Erma Rahayu, Abdulghafor, Rawad Abdulkhaleq Abdulmolla

    Published 2021
    “…Moreover, the performance of the proposed method was compared with the A-star and laser simulator (LS) algorithms in terms of path length, computational time and path smoothness. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Comprehensive review of drones collision avoidance schemes: challenges and open issues by Rezaee, Mohammad Reza, Abdul Hamid, Nor Asilah Wati, Hussin, Masnida, Ahmad Zukarnain, Zuriati

    Published 2024
    “…We explore collision avoidance methods for UAVs from various perspectives, categorizing them into four main groups: obstacle detection and avoidance, collision avoidance algorithms, drone swarm, and path optimization. …”
    Get full text
    Get full text
    Get full text
    Article