Search Results - (( location detection model algorithm ) OR ( based optimization model algorithm ))*

Search alternatives:

Refine Results
  1. 1

    Fault Detection Relevant, Neural Network and Evolutionary Algorithm based Model for a Single-shaft Industrial Gas Turbine by Alemu Lemma, Tamiru, Rangkuti, Chalillullah, Mohd Hashim, Fakhruldin

    Published 2009
    “…Analytical redundancy based fault detection system generally requires an accurate model. …”
    Get full text
    Conference or Workshop Item
  2. 2

    Evaluation of different peak models of eye blink EEG for signal peak detection using artificial neural network by Adam, A., Ibrahim, Z., Mokhtar, N., Shapiai, M.I., Mubin, M.

    Published 2016
    “…In this study, performance evaluation of the existing peak models is conducted based on Artificial Neural Network (ANN) with particle swarm optimization (PSO) as learning algorithm. …”
    Get full text
    Get full text
    Article
  3. 3

    Evaluation Of Different Peak Models Of Eye Blink Eeg For Signal Peak Detection Using Artificial Neural Network by Asrul, Adam, Zuwairie, Ibrahim, Mohd Ibrahim, Shapiai, Marizan, Mubin

    Published 2016
    “…In this study, performance evaluation of the existing peak models is conducted based on Artificial Neural Network (ANN) with particle swarm optimization (PSO) as learning algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Fraud detection in shipping industry based on location using machine learning comparison techniques by Ganesan Subramaniam, Mr.

    Published 2023
    “…Speed of detection derived from the speed of model execution is also important for earlier detection of fraudulent cases. …”
    text::Thesis
  5. 5

    Optimized techniques for landslide detection and characteristics using LiDAR data by Mezaal, Mustafa Ridha

    Published 2018
    “…Also, six techniques: Ant Colony Optimization (ACO), Gain Ratio (GR), Particle Swarm Optimization (PSO) and Genetic Algorithm (GA), Random forest (RF), and Correlation-based Feature Selection (CFS) were used for the feature selection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Optimizing the travel distance between mosque and muslim affair activities using Delaunay Triangulation / Siti Nor Dalila Shamsul Bahar by Shamsul Bahar, Siti Nor Dalila

    Published 2019
    “…In this study, incremental algorithms of Delaunay triangulation are form based on the location of the mosques in Perlis. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower by Gatea, Sarah Jabbar

    Published 2018
    “…The results are used to develop the hybrid learning algorithm based on the AdaBoost, Bagging, and RUSBoost methods to predict the damage in the tower based on dynamic frequency domain. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Machine-learning-based adaptive distance protection relay to eliminate zone-3 protection under-reach problem on statcom-compensated transmission lines by Aker, Elhadi Emhemed Alhaaj Ammar

    Published 2020
    “…The earlier intelligent approach presented an offline approach using only faulty line parameters for intelligent classifier model training to detect, classify and locate faults. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Landslide susceptibility mapping using decision-tree based chi-squared automatic interaction detection (CHAID) and logistic regression (LR) integration by Althuwaynee, Omar F., Pradhan, Biswajeet, Ahmad, Noordin

    Published 2014
    “…LR model was used to find the corresponding coefficients of best fitting function that assess the optimal terminal nodes. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Modelling of cupping suction system based on system identification method by Suresh, Kavindran, Ghazali, M. R., Ahmad, M. A.

    Published 2022
    “…The detection of cupped suction system plants using a standard model based on a modified Sine Cosine Algorithm (mSCA) is presented in this research. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Image watermarking optimization algorithms in transform domains and feature regions by Tao, Hai

    Published 2012
    “…The achieved tradeoffs from these techniques between imperceptibility and robustness are controversial.To solve this problem,this study proposes the application of artificial intelligent techniques into digital watermarking by using discrete wavelet transform (DWT) and singular value decomposition (SVD).To protect the copyright information of digital images,the original image is decomposed according to two-dimensional discrete wavelet transform.Subsequently the preprocessed watermark with an affined scrambling transform is embedded into the vertical subband (HLm) coefficients in wavelet domain without compromising the quality of the image.The scaling factors are trained with the assistance of Particle Swarm Optimization (PSO).A new algorithmic framework is used to forecast feasibility of hypothesized watermarked images.In addition,the novelty is to associate the Hybrid Particle Swarm Optimization (HPSO),instead of a single optimization,as a model with SVD.To embed and extract the watermark,the singular values of the blocked host image are modified according to the watermark and scaling factors. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Segmentation of pulmonary cavity in lung CT scan for tuberculosis disease by Tan, Zhuoyi, Madzin, Hizmawati, Khalid, Fatimah, Beng, Ng Seng

    Published 2024
    “…Finally, we use the generated TB semantic segmentation mask to train Unet and Vnet models to verify the effectiveness of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Vein recognition using CNN / Wan Nur Nadia Shafiqah Wan Mohd Rohaizan @ Wan Mohd Fakruddin by Wan Mohd Rohaizan @ Wan Mohd Fakruddin, Wan Nur Nadia Shafiqah

    Published 2024
    “…The actual work performed included data collection from the GitHub repository, implementation of the CNN algorithm, training the model, and evaluating its performance. …”
    Get full text
    Get full text
    Thesis
  14. 14

    An enhancement particle-based method for dynamic object tracking by Zalili, Musa

    Published 2016
    “…Furthermore, a model-based particle filter is used to address the problem of tracking objects precisely. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Development of IoT-based automated dynamic emergency response system against fire incidents in academic building by Al-Hady, Syed Mohammed Zakaria, Islam, Md Rafiqul, Rashid, Muhammad Mahbubur

    Published 2023
    “…The system also includes an emergency response website that allows users to access real-time information about the fire incident, location, severity, and evacuation instructions. Additionally, the proposed system incorporates Building Information Modelling (BIM) to optimize evacuation and rescue routes, providing early detection and accurate alarm capabilities, evacuation guidance for endangered individuals, and guidance for firefighters. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Malicious URL classification using artificial fish swarm optimization and deep learning by Mustafa Hilal, Anwer, Hassan Abdalla Hashim, Aisha, G. Mohamed, Heba, K. Nour, Mohamed, M. Asiri, Mashael, M. Al-Sharafi, Ali, Othman, Mahmoud, Motwakel, Abdelwahed

    Published 2023
    “…With this motivation, the current article develops an Artificial Fish Swarm Algorithm (AFSA) with Deep Learning Enabled Malicious URL Detection and Classification (AFSADL-MURLC) model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    A novel ensemble decision tree-based CHi-squared Automatic Interaction Detection (CHAID) and multivariate logistic regression models in landslide susceptibility mapping by Althuwaynee, Omar F., Pradhan, Biswajeet, Park, Hyuck Jin, Lee, Jung Hyun

    Published 2014
    “…An ensemble algorithm of data mining decision tree (DT)-based CHi-squared Automatic Interaction Detection (CHAID) is widely used for prediction analysis in variety of applications. …”
    Get full text
    Get full text
    Article
  18. 18

    Modeling of cupping suction system based on system identification method by Kavindran, Suresh

    Published 2022
    “…Cupping suction plant identification utilizing a nonlinear model based on the modified Sine Cosine Algorithm (mSCA). …”
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19

    Wavelet based fault tolerant control of induction motor / Khalaf Salloum Gaeid by Gaeid, Khalaf Salloum

    Published 2012
    “…The fault detection algorithm identifies the time and location of each fault. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Robust estimation methods for fixed effect panel data model having block-concentrated outliers by Abu Bakar @ Harun, Nor Mazlina

    Published 2019
    “…Not much research has been done on method of detecting HLPs for panel data. Hence, we have proposed Robust Diagnostic-F (RDF) to remedy the problem of masking and swamping in detecting HLPs. …”
    Get full text
    Get full text
    Thesis