Search Results - (( location detection based algorithm ) OR ( based simulation approach algorithm ))

Refine Results
  1. 1

    A fault syndromes simulator for random access memories by Wan Hasan, Wan Zuha, Abdul Halim, Izhal, Mohd Sidek, Roslina, Othman, Masuri

    Published 2008
    “…This work is focused on incorporating the March based test algorithm using a software simulator tool for implementing a fast and systematic memory testing algorithm. …”
    Get full text
    Get full text
    Article
  2. 2

    Fault section detection and location on distribution network using analytical voltage sags database by Khalid, A.R., Mokhlis, Hazlie, Li, H.

    Published 2006
    “…Finally, the most probable faulty section is identified using probability approach.This paper presents the implemented algorithms and the test of the algorithms on typical distribution networks. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol by Sjaugi, Muhammad Farhan

    Published 2008
    “…The proposed algorithms based on node location information that may be collected through Global Positioning System (GPS). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Investigation Of Ros Based Vehicle State Estimation With Uncertainties by Siti Nuraini, Che Huhaimi

    Published 2022
    “…Besides, the SLAM algorithm is used to give a picture of the robot to simultaneously map while locating itself. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5

    ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs by Khan, T., Singh, K., Hasan, M.H., Ahmad, K., Reddy, G.T., Mohan, S., Ahmadian, A.

    Published 2021
    “…ETERS also incorporates an irregular attenuation factor during the evaluation of communication trust to reflect the effect of various external factors such as natural calamity (earthquake), network congestion, etc., based on the trust values. However, a trust-based attack detection algorithm (TADA) assesses the reliability of SNs to detect internal attacks. …”
    Get full text
    Get full text
    Article
  6. 6

    Observer-based fault detection approach using fuzzy adaptive poles placement system with real-time implementation by Eissa, Magdy Abdullah, Sali, Aduwati, Ahmad, Faisul Arif, Darwish, Rania R.

    Published 2021
    “…This paper validated the system simulation by implementing fault detection algorithms by using a real-time embedded observer-based system. …”
    Get full text
    Get full text
    Article
  7. 7

    Detection Of Outliers And Structural Breaks In Structural Time Series Model Using Indicator Saturation Approach by Rose, Farid Zamani Che

    Published 2023
    “…Based on the simulation results, the sequential selection algorithm outperformed the non-sequential selection approach in the automatic GETS model selection procedure. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani by Seyed Asadollah, Abdiesfandani

    Published 2016
    “…The algorithm simulates two important tasks that are frequently used by the human experts to identify summarizing strategies used to produce the summary sentences: 1) sentences relevance identification; and 2) summarizing strategies identification. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Smart Microgrid approach for Distributed power generation of renewable energy by Khushi, Farha, Motakabber, S. M. A., Ahmed Hamida, Belal, Azman, Amelia Wong, Bhattacharjee, Amit

    Published 2021
    “…The Faulty Location Detection (FLD) process is centered by wavelet trigger signal and mathematical morphology algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    High impedance fault detection and localization in 11kV distribution system / Mohd Syukri Ali by Mohd Syukri , Ali

    Published 2018
    “…Subsequent algorithm simulation results show that the proposed methods are able to detect and subsequently locate the faults with high accuracies. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Hybrid fault detection using kalman filter and neural network for quadrotor micro aerial vehicle by Chan, Shi Jing

    Published 2018
    “…Two classes of approaches are analysed: the fault system identification approach ANN and the observer-based approach using the extended kalman filter. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Optimal distributed generation and load shedding scheme using artificial bee colony- hill climbing algorithm considering voltage stability and losses indices by Ali Abdallah, Ali Emhemed

    Published 2021
    “…To solve this problem, an optimal load shedding approach, integrated with optimal DG sizing is proposed using the ABC-HC algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A New Method Of Speed Sensorless Control For Permanent Magnet Synchronous Motor by Samat, Ahmad Asri Abd

    Published 2019
    “…Besides that, tests results for both simulation and experimental work, demonstrates the MRAS based on TS-FIS is capable of effectively and accurately locating the motor speed and rotor position angle in various conditions of speed with the given load to the motor for PMSM. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Improved static and dynamic FBG sensor system for real-time monitoring of composite structures by Vorathin, Epin

    Published 2017
    “…Thus, the designation of this research study is to improve the current FBG based real-time monitoring system with the use of certain functions and algorithms, that are the instant mesh-grid function, voltage normalization algorithm, CC-LSL algorithm, and FFT function. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Robust Kernel Density Function Estimation by Dadkhah, Kourosh

    Published 2010
    “…To evaluate the efficiency of the proposed method, comprehensive contaminated models are designed and simulated. The accuracy of the proposed new method was compared with the location and scale estimators based on M. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Breast Cancer Diagnosis Using Neuro-CBR Approach by Norlia, Md. Yusof

    Published 2005
    “…Hence, there is a need for multiple AI approach to support CAD. In this study, the Neural Network (NN) simulator with backpropagation algorithm was developed to predict the condition of the breast cancer tumor whether it is benign or maligant and Case-Base Reasoning (CBR) engine developed to classify the cancer stages as well as suggesting appropriate treatment to the patient. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks by Adday, Ghaihab Hassan, Subramaniam, Shamala K., Zukarnain, Zuriati Ahmad, Samian, Normalia

    Published 2023
    “…The second stage will validate the voting process through a novel perspective based on the TMS. TMS will check the voters’ replies based on the event’s location. …”
    Get full text
    Get full text
    Article
  18. 18

    An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach by Khan, T., Singh, K., Shariq, M., Ahmad, K., Savita, K.S., Ahmadian, A., Salahshour, S., Conti, M.

    Published 2023
    “…The proposed machine learning algorithm extracts various trust features such as Co-Location Relationship (CLR), Co-Work Relationship (CWR), Cooperativeness-Frequency-Duration (CFD), and Reward (R) to obtain a robust trust rating of sensor devices and predict future misbehavior. …”
    Get full text
    Get full text
    Article
  19. 19

    Distribution network fault section estimation using analytical database approach by Mokhtar, Ahmad Safawi

    Published 2004
    “…The fault needs to he detected, located and cleared as soon as possible. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Malicious URL classification using artificial fish swarm optimization and deep learning by Mustafa Hilal, Anwer, Hassan Abdalla Hashim, Aisha, G. Mohamed, Heba, K. Nour, Mohamed, M. Asiri, Mashael, M. Al-Sharafi, Ali, Othman, Mahmoud, Motwakel, Abdelwahed

    Published 2023
    “…With this motivation, the current article develops an Artificial Fish Swarm Algorithm (AFSA) with Deep Learning Enabled Malicious URL Detection and Classification (AFSADL-MURLC) model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article