Search Results - (( location detection model algorithm ) OR ( based simulation approach algorithm ))*

Refine Results
  1. 1

    Fault section detection and location on distribution network using analytical voltage sags database by Khalid, A.R., Mokhlis, Hazlie, Li, H.

    Published 2006
    “…Finally, the most probable faulty section is identified using probability approach.This paper presents the implemented algorithms and the test of the algorithms on typical distribution networks. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Detection Of Outliers And Structural Breaks In Structural Time Series Model Using Indicator Saturation Approach by Rose, Farid Zamani Che

    Published 2023
    “…Based on the simulation results, the sequential selection algorithm outperformed the non-sequential selection approach in the automatic GETS model selection procedure. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Smart Microgrid approach for Distributed power generation of renewable energy by Khushi, Farha, Motakabber, S. M. A., Ahmed Hamida, Belal, Azman, Amelia Wong, Bhattacharjee, Amit

    Published 2021
    “…The Faulty Location Detection (FLD) process is centered by wavelet trigger signal and mathematical morphology algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani by Seyed Asadollah, Abdiesfandani

    Published 2016
    “…The sentences relevance identification module uses a statistical based approach such as vector space model (VSM) to represent sentences and compute similarity between the source sentences and the summary sentences using the cosine similarity measure. …”
    Get full text
    Get full text
    Thesis
  5. 5

    ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs by Khan, T., Singh, K., Hasan, M.H., Ahmad, K., Reddy, G.T., Mohan, S., Ahmadian, A.

    Published 2021
    “…ETERS also incorporates an irregular attenuation factor during the evaluation of communication trust to reflect the effect of various external factors such as natural calamity (earthquake), network congestion, etc., based on the trust values. However, a trust-based attack detection algorithm (TADA) assesses the reliability of SNs to detect internal attacks. …”
    Get full text
    Get full text
    Article
  6. 6

    Breast Cancer Diagnosis Using Neuro-CBR Approach by Norlia, Md. Yusof

    Published 2005
    “…Hence, there is a need for multiple AI approach to support CAD. In this study, the Neural Network (NN) simulator with backpropagation algorithm was developed to predict the condition of the breast cancer tumor whether it is benign or maligant and Case-Base Reasoning (CBR) engine developed to classify the cancer stages as well as suggesting appropriate treatment to the patient. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    A New Method Of Speed Sensorless Control For Permanent Magnet Synchronous Motor by Samat, Ahmad Asri Abd

    Published 2019
    “…DSpace is deployed for algorithm implementation. The analysis is carried out by comparing the simulation and hardware implementation in different cases of motor conditions. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Robust Kernel Density Function Estimation by Dadkhah, Kourosh

    Published 2010
    “…To evaluate the efficiency of the proposed method, comprehensive contaminated models are designed and simulated. The accuracy of the proposed new method was compared with the location and scale estimators based on M. …”
    Get full text
    Get full text
    Thesis
  9. 9

    An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach by Khan, T., Singh, K., Shariq, M., Ahmad, K., Savita, K.S., Ahmadian, A., Salahshour, S., Conti, M.

    Published 2023
    “…The proposed machine learning algorithm extracts various trust features such as Co-Location Relationship (CLR), Co-Work Relationship (CWR), Cooperativeness-Frequency-Duration (CFD), and Reward (R) to obtain a robust trust rating of sensor devices and predict future misbehavior. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Modified damage location indices in beam-like structure: Analytical study by Fayyadh, M.M., Razak, H.A.

    Published 2011
    “…The modified algorithms are able to detect the damage wherever its location, applying even to cases of multi damage locations. …”
    Get full text
    Get full text
    Article
  12. 12

    Detection of leak size and its location in a water distribution system by using K-NN / Nasereddin Ibrahim Sherksi by Sherksi, Nasereddin Ibrahim

    Published 2020
    “…This thesis proposes a classification model to detect water leakage, focusing on finding water leakage’s location and size, using K-Nearest Neighbour (K-NN) classification method. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Fraud detection in shipping industry based on location using machine learning comparison techniques by Ganesan Subramaniam, Mr.

    Published 2023
    “…Speed of detection derived from the speed of model execution is also important for earlier detection of fraudulent cases. …”
    text::Thesis
  14. 14

    Evaluation of different peak models of eye blink EEG for signal peak detection using artificial neural network by Adam, A., Ibrahim, Z., Mokhtar, N., Shapiai, M.I., Mubin, M.

    Published 2016
    “…Therefore, the purpose of peak detection algorithm is to distinguish an actual peak location from a list of peak candidates. …”
    Get full text
    Get full text
    Article
  15. 15

    Improved abnormal detection using self-adaptive social force model for visual surveillance by Wan Nur Azhani, W. Samsudin

    Published 2017
    “…In this work, we aim to find the significant interaction forces and detect the abnormality in the crowd by using Self-Adaptive Social Force Model. …”
    Get full text
    Get full text
    Thesis
  16. 16

    An Intelligent Voltage Controller for a PV Inverter System Using Simulated Annealing Algorithm-Based PI Tuning Approach by Najeeb, Mushtaq, Muhamad, Mansor, Ramdan, Razali, Hamdan, Daniyal, Ali, Mahmood

    Published 2017
    “…This study associates an intelligent voltage controller based PI approach for PV electrical inverter by employing a meta-heuristic optimization algorithmic called a Simulated Annealing (SA) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Fault Detection Relevant, Neural Network and Evolutionary Algorithm based Model for a Single-shaft Industrial Gas Turbine by Alemu Lemma, Tamiru, Rangkuti, Chalillullah, Mohd Hashim, Fakhruldin

    Published 2009
    “…Analytical redundancy based fault detection system generally requires an accurate model. …”
    Get full text
    Conference or Workshop Item
  18. 18

    A review on object detection algorithms based deep learning methods / Wan Xing ... [et al.] by Wan Xing, Sultan Mohd, Mohd Rizman, Johari, Juliana, Ahmat Ruslan, Fazlina

    Published 2023
    “…Deep learning-based object detection algorithms can be categorized into three main types: end-to-end algorithms, two-stage algorithms, and one-stage algorithms. …”
    Get full text
    Get full text
    Article
  19. 19

    3D face registration across pose variation and facial expression using cross profile alignment by Anuar, Laili Hayati

    Published 2011
    “…The experiment conducted on challenging 3D face databases yields good results with 94.77% detection rate for the nose tip region detection algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Stiffness reduction index for detection of damage location: Analytical study by Fayyadh, M.M., Razak, H.A.

    Published 2011
    “…The study has validated the new index to detect the damage location for the case of multi damage location presented at the same time along the beam length. …”
    Get full text
    Get full text
    Article