Search Results - (( data identification using algorithm ) OR ( parameter detection method algorithm ))
Search alternatives:
- identification using »
- data identification »
- parameter detection »
- method algorithm »
- using algorithm »
-
1
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article -
2
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
Get full text
Get full text
Thesis -
3
Novel algorithms of identifying types of partial discharges using electrical and non-contact methods / Mohammad Shukri Hapeez
Published 2015“…By using ultrasonic methods, the obtained PD data is conventionally identified using Neural Network (NN) models where it has several disadvantages. …”
Get full text
Get full text
Thesis -
4
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…This resulted in the high accuracy of the damage detection algorithm. The second proposed method seeks to identify damage in the structural parameters of linear and nonlinear systems. …”
Get full text
Get full text
Get full text
Thesis -
5
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
Get full text
Get full text
Thesis -
6
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…Optimization algorithms are widely used for the identification of intrusion. …”
Get full text
Get full text
Get full text
Article -
7
Fuzzy modelling using firefly algorithm for phishing detection
Published 2019“…One of the suitable methods provides the Firefly Algorithm (FA). FA is a nature-inspired algorithm that uses fireflies’ behavior to interpret data. …”
Get full text
Get full text
Get full text
Article -
8
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
Get full text
Get full text
Get full text
Thesis -
9
Twisted pair cable fault diagnosis via random forest machine learning
Published 2022“…Then, the random forests algorithms (RFs), a data-driven method, are adopted to train the fault diagnosis classifier and regression algorithm with the processed fault data. …”
Get full text
Get full text
Get full text
Article -
10
Fault Detection and Identification in Quadrotor System (Quadrotor Robot)
Published 2016“…This Artificial Neural Network (ANN) is an algorithm that is used to determine the type of fault and the severity level as well as isolate the fault from the system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Novel algorithms of identifying types of Partial Discharges using electrical and non-contact methods / Mohammad Shukri Hapeez
Published 2015“…By using ultrasonic methods, the obtained PD data is conventionally identified using Neural Network (NN) models where it has several disadvantages. …”
Get full text
Get full text
Book Section -
12
Safe experimentation dynamics algorithm for identification of cupping suction based on the nonlinear Hammerstein model
Published 2023“…This research paper suggests a method to detect the cupping suction model by employing the Hammerstein model and utilizing the Safe Experimentation Dynamics (SED) algorithm. …”
Get full text
Get full text
Get full text
Article -
13
Modified least trimmed squares method for face recognition / Nur Azimah Abdul Rahim
Published 2018“…The genetic algorithm configuration for n (number of observations) and p (parameter) was changed to assess the performance of modified method. …”
Get full text
Get full text
Thesis -
14
-
15
The largest studentized residual test for bad data identification in state estimation of a power system
Published 2015“…The chi-square and normalized residual tests are the common post estimation procedures usually used for detection and identification of gross errors in the estimation algorithm. …”
Get full text
Get full text
Article -
16
Modelling of cupping suction system based on system identification method
Published 2022Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Modeling of cupping suction system based on system identification method
Published 2022“…Cupping suction plant identification utilizing a nonlinear model based on the modified Sine Cosine Algorithm (mSCA). …”
Get full text
Get full text
Undergraduates Project Papers -
18
Robust Estimation Methods And Outlier Detection In Mediation Models
Published 2010“…The Ordinary Least Squares (OLS) method is often use to estimate the parameters of the mediation model. …”
Get full text
Get full text
Thesis -
19
Outlier Detections and Robust Estimation Methods for Nonlinear Regression Model Having Autocorrelated and Heteroscedastic Errors
Published 2010“…Finally, we proposed statistics practitioners to use the formal modeling algorithms to get better inferences. …”
Get full text
Get full text
Thesis -
20
Rockfall hazard assessment based on airborne laser scanning data and GIS in tropical region
Published 2016“…An airborne laser scanner (ALS) was used to gather high-density data point (3-4 pts/m²). …”
Get full text
Get full text
Thesis
