Search Results - (( panel estimation using algorithm ) OR ( variable detection based algorithm ))

Refine Results
  1. 1

    Spacecraft sun-pointing using coplanar solar panels data and magnetic field measurements by Mohammad Abdelrahman, Mohammad Ibraheem

    Published 2013
    “…The proposed algorithm has been applied to EgyptSat-1. The satellite is switched from earth-pointing to sun-pointing mode using the estimated sun-vector. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    Robust estimation methods for fixed effect panel data model having block-concentrated outliers by Abu Bakar @ Harun, Nor Mazlina

    Published 2019
    “…The Ordinary Least Squares (OLS) is the commonly used method to estimate the parameters of fixed effect panel data model. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Attitude and deformation coupled estimation of flexible satellite using low-cost sensors by Ghani, Marzieh, Assadian, Nima, Varatharajoo, Renuganth

    Published 2022
    “…The numerical results also demonstrate that including the flexibility model in the developed estimation equations enables the algorithm to successfully estimate the deformation at any solar panel location without the need for any conventional sensor that directly measures the strain and/or deformation.…”
    Get full text
    Get full text
    Article
  4. 4

    Implementation of a modified incremental conductance MPPT algorithm with direct control based on a fuzzy duty cycle change estimator using dSPACE by Radjai, T., Rahmani, L., Mekhilef, Saad, Gaubert, J.P.

    Published 2014
    “…A fuzzy logic estimator (FLE) is used to estimate the new duty cycle used to track the PV array maximum power point. …”
    Get full text
    Article
  5. 5

    Performance analyses of various photovoltaic power plant based on local spectral irradiances in Malaysia using genetic algorithm by Lim, Song Wei

    Published 2023
    “…This project aims to measure the performances of various photovoltaic power plants in Malaysia based on local spectral irradiances using genetic algorithm. A Python computational model that uses genetic algorithms will be developed to estimate the optimal tilt angle and orientation angle as well as the solar power received for the solar sites. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Observer-based fault detection with fuzzy variable gains and its application to industrial servo system by Eissa, Magdy Abdullah, Sali, Aduwati, Hassan, Mohd Khair, Bassiuny, A. M., Darwish, Rania R.

    Published 2020
    “…The proposed fault detection algorithm employs a fuzzy logic-based approach with the objective of finding the appropriate observer gains that could cope with the different working conditions. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti... by Mohd Sayud, Nur Asikin

    Published 2018
    “…In this study, several models has been created which are from QPS Fledermaus model, BTM model and Slope Variability model. Slope variability model is an algorithm that is being used for detecting terrain roughness. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Minimization of Test Cases and Fault Detection Effectiveness Improvement through Modified Reduction with Selective Redundancy Algorithm by Nikfal, Shima

    Published 2007
    “…Then the algorithm gathers all the test cases based on the definition occurrence and def-use pair if they cover same definition occurrence of one variable but they don’t cover def-use pair of the same variable. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Fault diagnostic algorithm for precut fractionation column by Heng, H. Y., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2004
    “…Hazard and Operability Study (HAZOP) is used to support the diagnosis task. The algorithm has been successful in detecting the deviations of each variable by testing the data set. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Potential norms detection in social agent societies by Mahmoud M.A., Mustapha A., Ahmad M.S., Ahmad A., Yusoff M.Z.M., Hamid N.H.A.

    Published 2023
    “…In this paper, we propose a norms mining algorithm that detects a domain's potential norms, which we called the Potential Norms Mining Algorithm (PNMA). …”
    Article
  12. 12

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…With respect to all the algorithms, V-Detector proved to be superior and surpassed all other algorithms based on performance and execution time.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Building norms-adaptable agents from Potential Norms Detection Technique (PNDT) by Mahmoud M.A., Ahmad M.S., Ahmad A., Mustapha A., Yusoff M.Z.M., Hamid N.H.A.

    Published 2023
    “…This technique enables an agent to update its norms even in the absence of sanctions from a third-party enforcement authority as found in some work, which entail sanctions by a third-party to detect and identify the norms. The PNDT consists of five components: agent's belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent's belief base with new normative protocol. …”
    Short Survey
  15. 15
  16. 16

    Shape-based Road Sign Detection and Recognition for Embedded Application Using MATLAB by Md Sallah, Siti Sarah, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2010
    “…The algorithm is based on the Hough transform method to detect lines in order to identify and determine the shape of the road sign. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Modeling and analysis of the impact of information and communication technology on household consumption expenditure in different regions by Fan, Chaozhi, Law, Siong Hook, Ibrahim, Saifuzzaman, Naseem, N. A. M.

    Published 2022
    “…Based on the panel data of cities and towns in China, by using the generalized estimation method of a dynamic panel, through the construction of regional household consumption expenditure evaluation models, optimize the impact evaluation algorithm of household consumption expenditure in different regions, standardize critic indicators, and build the impact modeling of household consumption expenditure in combination with relevant algorithms such as the Engel coefficient. …”
    Get full text
    Get full text
    Article
  18. 18

    Building norms-adaptable agents from Potential Norms Detection Technique (PNDT) by Mahmoud, Moamin Ahmed, Ahmad, Mohd Sharifuddin, Ahmad, Azhana, Mustapha, Aida, Mohd Yusoff, Mohd Zaliman, Abdul Hamid, Nurzeatul Hamimah

    Published 2013
    “…This technique enables an agent to update its norms even in the absence of sanctions from a third-party enforcement authority as found in some work, which entail sanctions by a third-party to detect and identify the norms. The PNDT consists of five components: agent’s belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent’s belief base with new normative protocol. …”
    Get full text
    Get full text
    Article
  19. 19

    MotionSure: a cloud-based algorithm for detection of injected object in data in motion by Islam, Thouhedul, Olanrewaju, Rashidah Funke, Khalifa, Othman Omran

    Published 2017
    “…Total 1600 different type of files were used for evaluation of the proposed algorithm, results show that 87% of injected objects were correctly detected…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    A new modified differential evolution algorithm scheme-based linear frequency modulation radar signal de-noising by Al-Dabbagh, Mohanad Dawood, Al-Dabbagh, Rawaa Dawoud, Raja Abdullah, Raja Syamsul Azmir, Hashim, Fazirulhisyam

    Published 2015
    “…A modified crossover scheme called rand-length crossover was designed to fit the proposed variable-length DE, and the new DE algorithm is referred to as the random variable-length crossover differential evolution (rvlx-DE) algorithm. …”
    Get full text
    Get full text
    Article