Search Results - (( panel estimation method algorithm ) OR ( key detection system algorithm ))
Search alternatives:
- estimation method »
- panel estimation »
- method algorithm »
- system algorithm »
- key detection »
-
1
Robust estimation methods for fixed effect panel data model having block-concentrated outliers
Published 2019“…The Ordinary Least Squares (OLS) is the commonly used method to estimate the parameters of fixed effect panel data model. …”
Get full text
Get full text
Thesis -
2
Implementation of a modified incremental conductance MPPT algorithm with direct control based on a fuzzy duty cycle change estimator using dSPACE
Published 2014“…A controlled Cuk DC-DC converter was implemented and connected to a SunTech STP085B PV panel to verify the accuracy of the proposed method. …”
Get full text
Article -
3
Performance analyses of various photovoltaic power plant based on local spectral irradiances in Malaysia using genetic algorithm
Published 2023“…Besides, the genetic algorithm has showed that it is an effective and efficient way to perform estimation of optimal tilt angle and orientation angle for solar sites with genetic algorithm as it is able to produce correct and accurate result in a short amount of time.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Augmenting the Robustness and Efficiency of Violence Detection Systems for Surveillance and Non-Surveillance Scenarios
Published 2022“…The keyframes selection process is critical in violence detection systems, as it reduces computational complexity and enhances accuracy. …”
Get full text
Get full text
Get full text
Article -
5
Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan
Published 2014“…El-gamal encryption system is an asymmetric key encryption algorithm which is based on the Diffie-Hellman key exchange. …”
Get full text
Get full text
Thesis -
6
A novel algorithm to detect a QPSK signal with the minimum number of samples
Published 2015“…In digital communication the QPSK (quadrature phase-shift keying) signal occupies a special position, from satellite systems through to Local Area Networks (LAN). …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Landmark detection for vision based of autonomous guided vehicle
Published 2012“…The algorithm is developed not only to detect and recognize but also to distinguish landmark from non-landmark. …”
Get full text
Get full text
Undergraduates Project Papers -
8
Cabbage disease detection system using k-NN algorithm
Published 2022“…It is a method of extracting second-order statistical texture features to detect diseases more efficiently. Finally, the KNN algorithm will be used to classify the disease based on sample nature and a cabbage disease data set. …”
Get full text
Get full text
Get full text
Academic Exercise -
9
Vehicle detection for vision-based intelligent transportation systems using convolutional neural network algorithm
Published 2022“…Vehicle detection in Intelligent Transportation Systems (ITS) is a key factor ensuring road safety, as it is necessary for the monitoring of vehicle flow, illegal vehicle type detection, incident detection, and vehicle speed estimation. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Modeling and analysis of the impact of information and communication technology on household consumption expenditure in different regions
Published 2022“…Based on the panel data of cities and towns in China, by using the generalized estimation method of a dynamic panel, through the construction of regional household consumption expenditure evaluation models, optimize the impact evaluation algorithm of household consumption expenditure in different regions, standardize critic indicators, and build the impact modeling of household consumption expenditure in combination with relevant algorithms such as the Engel coefficient. …”
Get full text
Get full text
Article -
11
Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin
Published 2024“…The "Remote to Local (R2L) Intrusion Detection System Using Decision Tree" project aims to address the escalating threat of network intrusions by developing an effective intrusion detection system. …”
Get full text
Get full text
Thesis -
12
An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization
Published 2019“…The objective of this work is to improve our previous action key frames extraction algorithm (AKF) by adapting a threshold which selects action key frames as final key frames. …”
Get full text
Get full text
Article -
13
-
14
Road triangle detection for non-road area elimination using lane detection and image multiplication
Published 2017“…The background has become the key issue in maintaining the accuracy of final analysis for object detection in the development of an image processing algorithm. …”
Get full text
Get full text
Get full text
Article -
15
Improving intrusion detection using genetic algorithm
Published 2013“…Intrusion Detection System (IDS) is one of the key security components in today’s networking environment. …”
Get full text
Get full text
Get full text
Article -
16
Artificial neural networks and genetic algorithm for transformer winding/insulation faults
Published 2008“…A back propagation training method is applied in neural network to detect the faults without cellulose involvement. Genetic Algorithm is used to derive the optimal key gas ratios to enhance the accuracy of fault detection. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
-
18
-
19
Development of cellular neural network algorithm for detecting lung cancer symptoms
Published 2012Get full text
Working Paper -
20
Embedded vision system development using 32-bit Single Board Computer and GNU/Linux
Published 2011“…The increasing affordability of powerful processors and memory chips, availability of real-time operating systems, low complexity intelligent algorithms and the coming-of-age of system development software are the key factor that makes this development possible. …”
Get full text
Thesis
