Search Results - (( location detection system algorithm ) OR ( based simulation approach algorithm ))

Refine Results
  1. 1

    Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol by Sjaugi, Muhammad Farhan

    Published 2008
    “…The proposed algorithms based on node location information that may be collected through Global Positioning System (GPS). …”
    Get full text
    Get full text
    Thesis
  2. 2

    Smart Microgrid approach for Distributed power generation of renewable energy by Khushi, Farha, Motakabber, S. M. A., Ahmed Hamida, Belal, Azman, Amelia Wong, Bhattacharjee, Amit

    Published 2021
    “…The Faulty Location Detection (FLD) process is centered by wavelet trigger signal and mathematical morphology algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    Optimal distributed generation and load shedding scheme using artificial bee colony- hill climbing algorithm considering voltage stability and losses indices by Ali Abdallah, Ali Emhemed

    Published 2021
    “…The simulation results showed that the MLSI index has strong sensitivity to detect the overloaded line in the system and as reliable as other voltage stability indices. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Observer-based fault detection approach using fuzzy adaptive poles placement system with real-time implementation by Eissa, Magdy Abdullah, Sali, Aduwati, Ahmad, Faisul Arif, Darwish, Rania R.

    Published 2021
    “…Utilizing self-tuning for the observer correction stage, the gain is going to be updated online using the proposed fuzzy adaptive poles placement (FAPP) system. This paper validated the system simulation by implementing fault detection algorithms by using a real-time embedded observer-based system. …”
    Get full text
    Get full text
    Article
  5. 5

    Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani by Seyed Asadollah, Abdiesfandani

    Published 2016
    “…To evaluate the algorithm, we conducted two experiments. In the first experiment, we examine the functionality of the system, whether the system is able to identify the summarizing strategies used by students in summary writing. …”
    Get full text
    Get full text
    Thesis
  6. 6

    High impedance fault detection and localization in 11kV distribution system / Mohd Syukri Ali by Mohd Syukri , Ali

    Published 2018
    “…Subsequent algorithm simulation results show that the proposed methods are able to detect and subsequently locate the faults with high accuracies. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Hybrid fault detection using kalman filter and neural network for quadrotor micro aerial vehicle by Chan, Shi Jing

    Published 2018
    “…Two classes of approaches are analysed: the fault system identification approach ANN and the observer-based approach using the extended kalman filter. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Investigation Of Ros Based Vehicle State Estimation With Uncertainties by Siti Nuraini, Che Huhaimi

    Published 2022
    “…Besides, the SLAM algorithm is used to give a picture of the robot to simultaneously map while locating itself. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9

    ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs by Khan, T., Singh, K., Hasan, M.H., Ahmad, K., Reddy, G.T., Mohan, S., Ahmadian, A.

    Published 2021
    “…Furthermore, a trust-based secure routing algorithm is incorporated to dynamically detect misbehavior in terms of packet forwarding for energy-efficient communication among sensor nodes. …”
    Get full text
    Get full text
    Article
  10. 10

    Improved static and dynamic FBG sensor system for real-time monitoring of composite structures by Vorathin, Epin

    Published 2017
    “…Thus, the designation of this research study is to improve the current FBG based real-time monitoring system with the use of certain functions and algorithms, that are the instant mesh-grid function, voltage normalization algorithm, CC-LSL algorithm, and FFT function. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A New Method Of Speed Sensorless Control For Permanent Magnet Synchronous Motor by Samat, Ahmad Asri Abd

    Published 2019
    “…This new technique is based on Takagi Sugeno Fuzzy Inference System (TS-FIS). …”
    Get full text
    Get full text
    Thesis
  12. 12

    Breast Cancer Diagnosis Using Neuro-CBR Approach by Norlia, Md. Yusof

    Published 2005
    “…The proposed system is developed in the web-based platform, so that it can be accessed anytime, anywhere regardless of the geographical location.…”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Distribution network fault section estimation using analytical database approach by Mokhtar, Ahmad Safawi

    Published 2004
    “…A fault in a power system may cause interruption of supply. The fault needs to he detected, located and cleared as soon as possible. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Malicious URL classification using artificial fish swarm optimization and deep learning by Mustafa Hilal, Anwer, Hassan Abdalla Hashim, Aisha, G. Mohamed, Heba, K. Nour, Mohamed, M. Asiri, Mashael, M. Al-Sharafi, Ali, Othman, Mahmoud, Motwakel, Abdelwahed

    Published 2023
    “…With this motivation, the current article develops an Artificial Fish Swarm Algorithm (AFSA) with Deep Learning Enabled Malicious URL Detection and Classification (AFSADL-MURLC) model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Open phase fault-tolerant support vector machine predictive power control for six-phase induction generator WECS by Hamoudi Y., Abdolrasol M.G.M., Amimeur H., Hassaini F., Ker P.J., Ustun T.S.

    Published 2025
    “…s stability. Importantly, this approach does not require reconfiguring the control algorithm while preserving the system?…”
    Article
  16. 16

    Car plate detection system by Gunasegaran, Krishnan

    Published 2005
    “…This is because if the system fails to detect the location of the car plate, then the whole system is a failure because recognition can only be done after successful plate location. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17

    Face detection and stereo matching algorithms for smart surveillance system with IP cameras by Abd Manap, Nurulfajar

    Published 2010
    “…The research consists of algorithm development in surveillance system including face detection, stereo matching, location estimation and implementation with ACTi PTZ camera. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Detection of leak size and its location in a water distribution system by using K-NN / Nasereddin Ibrahim Sherksi by Sherksi, Nasereddin Ibrahim

    Published 2020
    “…Secondly, the data collected from the main valve chamber controllers, which are located in the main pipes. The successfully achieved four set objectives inclusive of (1) a new classification model to detect water leakage, (2) analysis of the effects of leakage size on the variables within a WDS, i.e. flow, pressure, pipe volume, velocity and water demand, (3) locating and specifying the leakage size in the WDS, and (4) evaluate the performance of the designed K-NN algorithm for accurate leak detection. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar by Seyed Alireza, Ravanfar

    Published 2017
    “…This resulted in the high accuracy of the damage detection algorithm. The second proposed method seeks to identify damage in the structural parameters of linear and nonlinear systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…Since it is a costly approach, we propose a detection system using Resource Allocating Network (RAN) with data selection to select essential data. …”
    Get full text
    Get full text
    Thesis