Search Results - (( location detection model algorithm ) OR ( based optimization model algorithm ))*
Search alternatives:
- location detection »
- optimization model »
- detection model »
- model algorithm »
-
1
Fault Detection Relevant, Neural Network and Evolutionary Algorithm based Model for a Single-shaft Industrial Gas Turbine
Published 2009“…Analytical redundancy based fault detection system generally requires an accurate model. …”
Get full text
Conference or Workshop Item -
2
Evaluation of different peak models of eye blink EEG for signal peak detection using artificial neural network
Published 2016“…In this study, performance evaluation of the existing peak models is conducted based on Artificial Neural Network (ANN) with particle swarm optimization (PSO) as learning algorithm. …”
Get full text
Get full text
Article -
3
Evaluation Of Different Peak Models Of Eye Blink Eeg For Signal Peak Detection Using Artificial Neural Network
Published 2016“…In this study, performance evaluation of the existing peak models is conducted based on Artificial Neural Network (ANN) with particle swarm optimization (PSO) as learning algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Fraud detection in shipping industry based on location using machine learning comparison techniques
Published 2023“…Speed of detection derived from the speed of model execution is also important for earlier detection of fraudulent cases. …”
text::Thesis -
5
Optimized techniques for landslide detection and characteristics using LiDAR data
Published 2018“…Also, six techniques: Ant Colony Optimization (ACO), Gain Ratio (GR), Particle Swarm Optimization (PSO) and Genetic Algorithm (GA), Random forest (RF), and Correlation-based Feature Selection (CFS) were used for the feature selection. …”
Get full text
Get full text
Get full text
Thesis -
6
Optimizing the travel distance between mosque and muslim affair activities using Delaunay Triangulation / Siti Nor Dalila Shamsul Bahar
Published 2019“…In this study, incremental algorithms of Delaunay triangulation are form based on the location of the mosques in Perlis. …”
Get full text
Get full text
Thesis -
7
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…The results are used to develop the hybrid learning algorithm based on the AdaBoost, Bagging, and RUSBoost methods to predict the damage in the tower based on dynamic frequency domain. …”
Get full text
Get full text
Thesis -
8
Machine-learning-based adaptive distance protection relay to eliminate zone-3 protection under-reach problem on statcom-compensated transmission lines
Published 2020“…The earlier intelligent approach presented an offline approach using only faulty line parameters for intelligent classifier model training to detect, classify and locate faults. …”
Get full text
Get full text
Thesis -
9
Landslide susceptibility mapping using decision-tree based chi-squared automatic interaction detection (CHAID) and logistic regression (LR) integration
Published 2014“…LR model was used to find the corresponding coefficients of best fitting function that assess the optimal terminal nodes. …”
Get full text
Get full text
Conference or Workshop Item -
10
Modelling of cupping suction system based on system identification method
Published 2022“…The detection of cupped suction system plants using a standard model based on a modified Sine Cosine Algorithm (mSCA) is presented in this research. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Image watermarking optimization algorithms in transform domains and feature regions
Published 2012“…The achieved tradeoffs from these techniques between imperceptibility and robustness are controversial.To solve this problem,this study proposes the application of artificial intelligent techniques into digital watermarking by using discrete wavelet transform (DWT) and singular value decomposition (SVD).To protect the copyright information of digital images,the original image is decomposed according to two-dimensional discrete wavelet transform.Subsequently the preprocessed watermark with an affined scrambling transform is embedded into the vertical subband (HLm) coefficients in wavelet domain without compromising the quality of the image.The scaling factors are trained with the assistance of Particle Swarm Optimization (PSO).A new algorithmic framework is used to forecast feasibility of hypothesized watermarked images.In addition,the novelty is to associate the Hybrid Particle Swarm Optimization (HPSO),instead of a single optimization,as a model with SVD.To embed and extract the watermark,the singular values of the blocked host image are modified according to the watermark and scaling factors. …”
Get full text
Get full text
Thesis -
12
Segmentation of pulmonary cavity in lung CT scan for tuberculosis disease
Published 2024“…Finally, we use the generated TB semantic segmentation mask to train Unet and Vnet models to verify the effectiveness of the algorithm. …”
Get full text
Get full text
Get full text
Article -
13
Vein recognition using CNN / Wan Nur Nadia Shafiqah Wan Mohd Rohaizan @ Wan Mohd Fakruddin
Published 2024“…The actual work performed included data collection from the GitHub repository, implementation of the CNN algorithm, training the model, and evaluating its performance. …”
Get full text
Get full text
Thesis -
14
An enhancement particle-based method for dynamic object tracking
Published 2016“…Furthermore, a model-based particle filter is used to address the problem of tracking objects precisely. …”
Get full text
Get full text
Thesis -
15
Development of IoT-based automated dynamic emergency response system against fire incidents in academic building
Published 2023“…The system also includes an emergency response website that allows users to access real-time information about the fire incident, location, severity, and evacuation instructions. Additionally, the proposed system incorporates Building Information Modelling (BIM) to optimize evacuation and rescue routes, providing early detection and accurate alarm capabilities, evacuation guidance for endangered individuals, and guidance for firefighters. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Malicious URL classification using artificial fish swarm optimization and deep learning
Published 2023“…With this motivation, the current article develops an Artificial Fish Swarm Algorithm (AFSA) with Deep Learning Enabled Malicious URL Detection and Classification (AFSADL-MURLC) model. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
A novel ensemble decision tree-based CHi-squared Automatic Interaction Detection (CHAID) and multivariate logistic regression models in landslide susceptibility mapping
Published 2014“…An ensemble algorithm of data mining decision tree (DT)-based CHi-squared Automatic Interaction Detection (CHAID) is widely used for prediction analysis in variety of applications. …”
Get full text
Get full text
Article -
18
Modeling of cupping suction system based on system identification method
Published 2022“…Cupping suction plant identification utilizing a nonlinear model based on the modified Sine Cosine Algorithm (mSCA). …”
Get full text
Get full text
Undergraduates Project Papers -
19
Wavelet based fault tolerant control of induction motor / Khalaf Salloum Gaeid
Published 2012“…The fault detection algorithm identifies the time and location of each fault. …”
Get full text
Get full text
Thesis -
20
Robust estimation methods for fixed effect panel data model having block-concentrated outliers
Published 2019“…Not much research has been done on method of detecting HLPs for panel data. Hence, we have proposed Robust Diagnostic-F (RDF) to remedy the problem of masking and swamping in detecting HLPs. …”
Get full text
Get full text
Thesis
