Search Results - (( mode detection method algorithm ) OR ( based information needs algorithm ))

Refine Results
  1. 1

    Collision avoidance algorithm design for UAV base on parametric theorem and circle overlapping method / Nur Fadzilah Mohamad Radzi by Nur Fadzilah, Mohamad Radzi

    Published 2013
    “…The algorithm is based on PTCOT (Parametric Theorem and Circle Overlapping Test) between two UAVs. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Real-time time series error-based data reduction for internet-of-things applications by Wong, Siaw Ling

    Published 2018
    “…There are many time series data reduction methods, ranging from primitive data aggregation such as Rate of Change to sophisticated compression algorithms. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    Weighting method for modal parameter based damage detection algorithms by Fayyadh, M.M., Abdul Razak, H.

    Published 2011
    “…This study proposes weighting method for damage detection algorithms based on the bending mode shapes for beam structures. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam by Fayyadh, M.M., Abdul Razak, H.

    Published 2011
    “…Proposed method returns one value of stiffness deterioration based on the considered set of modes, without affecting the sensitivity of damage detection algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Damage visualization based on frequency shift of single-mode ultrasound-guided wavefield by Shahrim, Muhamad Azim, Harmin, Mohammad Yazdi, Romli, Fairuz Izzuddin, Chia, Chen Ciang, Jung-Ryul, Lee

    Published 2022
    “…Ultrasonic wavefield inspection has been available for a while and it is a great method for damage detection. However, the challenge lies in the complexity of the algorithm for mode isolation. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Real‑time chatter detection during turning operation using wavelet scattering network by Sharma, Sanjay, Gupta, Vijay Kumar, Rahman, Mustafizur, Saleh, Tanveer

    Published 2024
    “…Several attempts have been made to detect chatter. Some manual feature extraction methods used to detect the chatter involve wavelet packet transform (WPT), ensemble empirical mode decomposition (EEMD), local mean decomposition (LMD), and variational mode decomposition (VMD). …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12

    Hydraulic characterization of PVC-O pipes by means of transient tests by Ghazali, M. F., Nizwan, Che Ku Eddy, Ismail, Nurazima, Sani, M. S.M., Yusof, Mohd Fadhlan M., Mohamed, Zamri

    Published 2019
    “…The thesis explains upon on how the process that are being introduced and being applied in the method of Ensemble Empirical Decomposition Method (EEMD) with signal masking, with it then the method would analyze the position of the leakage of the pipeline. …”
    Get full text
    Get full text
    Research Report
  13. 13
  14. 14

    LED based NIR spectroscopy for detection of lard adulteration in palm oil via chemometrics / Katrul Nadia Basri by Basri, Katrul Nadia

    Published 2017
    “…Short wave near infrared spectroscopy (NIR) method was implemented in this experiment to detect the presence of lard adulteration in palm oil. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y... by M.Yusop, Hanafi, Ghazali, M.F., M.Yusof, M.F., W.Hamat, W.S.

    Published 2017
    “…In recent studies, the analysis of pressure transient signal can be seen as an accurate and low-cost method for the leak and feature detection in water distribution system. …”
    Get full text
    Get full text
    Article
  16. 16

    Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz) by Hanafi, M. Yusop, M. F., Ghazali, Mohd Fadhlan, Mohd Yusof, Wan Sofian, Wan Hamat

    Published 2017
    “…In recent studies, the analysis of pressure transient signal can be seen as an accurate and low-cost method for the leak and feature detection in water distribution system. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Load shedding scheme for islanded distribution network with flexible load selection and power changes / Ja’far Saifeddin Abdelhafiz Jallad by Ja’far Saifeddin , Abdelhafiz Jallad

    Published 2018
    “…The main aim of this research is to address two important aspects; increasing the reliability of the system by maximizing the remaining load by improving the voltage bus after the application of load shedding in the planning mode, and detecting and estimating a new power deficit during the UFLS process in the operation mode with flexible load selection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Automatic filtering of far outliers in multibeam echo sounding dataset using robust detection algorithms by Mahmud, Mohd. Razali, Mohd. Yusof, Othman

    Published 2005
    “…A remarkable result can be achieved by filtering these far outliers using automatic detection mode. This paper elaborates the techniques used for the detection and elimination of the far outliers in the MBES dataset, known as robust detection algorithms. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Implementation of AES algorithm into information investigation autopsy (IIA) / Ahmad Wafiy Hamad Zaki by Hamad Zaki, Ahmad Wafiy Hamad Zaki

    Published 2013
    “…Information Investigation Autopsy (IIA) is the tools that can captured the information needed on the Local Area Network environment and later needed to be secured, the IIA need a module that can to secure the evidence captured from any harm. …”
    Get full text
    Get full text
    Student Project