Search Results - (( parallel estimation based algorithm ) OR ( variable detection learning algorithm ))

Refine Results
  1. 1

    A parallel genetic algorithm-based TSK-Fuzzy system for dynamic car-following modeling by Purnomo, Muhammad Ridwan Andi, Abdul Wahab, Dzuraidah, Hassan, Azmi, Rahmat, Riza Atiq

    Published 2009
    “…This paper presents the application of Parallel Genetic Algorithm (PGA)-based Takagi Sugeno Kang (TSK)-Fuzzy approach for dynamic car-following modeling in the traffic simulation software. …”
    Get full text
    Get full text
    Article
  2. 2

    New algorithm for gyroless spacecraft angular rate Estimation and its application by Abdelrahman, Mohammad, Samaan, Malak A.

    Published 2006
    “…A new algorithm for estimating the angular velocity using quaternion measurements is developed based on the concept of the global optimality resulting when using a centralized or master Kalman filter. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Pure intelligent monitoring system for steam economizer trips by Basim Ismail F., Hamzah Abed K., Singh D., Shakir Nasif M.

    Published 2023
    “…Economizers; Failure (mechanical); Fault detection; Knowledge acquisition; Learning algorithms; Learning systems; Neural networks; Plant shutdowns; Steam; Thermoelectric power plants; Extreme learning machine; Fault detection and diagnosis systems; Intelligent modeling; Intelligent monitoring systems; Network methodologies; Operational conditions; Operational variables; Thermal power plants; Steam power plants…”
    Conference Paper
  5. 5

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A bit-serial sum of absolute difference accelerator for variable block size motion estimation of H.264 by Fatemi, M.R.H., Ates, H.F., Salleh, R.

    Published 2009
    “…In this paper, we propose the first least significant bit (LSB) bit-serial sum of absolute difference (SAD) hardware accelerator for integer variable block size motion estimation (VBSME) of H.264. This hardware accelerator is based on a previous state-of-art bit-parallel architecture namely propagate partial SAD. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Monograph
  8. 8

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Resource Minimization in a Real-time Depth-map Processing System on FPGA by Ngo, Huy Tan, Hamid, Nor Hisham, Sebastian , Patrick, Yap, Vooi Voon

    Published 2011
    “…Depth-map algorithm allows camera system to estimate depth. It is a computational intensive algorithm, but can be implemented with high speed on hardware due to the parallelism property. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Conjunctions in biological neural architectures for visual pose estimation / Tom´As Maul by Tom´As, Maul

    Published 2006
    “…A highly parallel approach based on simple inter-map conjunctions, or correspondence distributions, is chosen and tested on synthetic and real patterns. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection by Ayodele Nojeem, Lasisi

    Published 2018
    “…Real-Valued Negative Selection Algorithm with Variable-Sized Detectors (V-Detectors) is an offspring of AIS and demonstrated its potentials in the field of anomaly detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Algorithm optimization and low cost bit-serial architecture design for integer-pixel and sub-pixel motion estimation in H.264/AVC / Mohammad Reza Hosseiny Fatemi by Hosseiny Fatemi, Mohammad Reza

    Published 2012
    “…This thesis is concerned with algorithm optimization and efficient low cost architecture design for integer motion estimation (IME) and sub-pixel motion estimation (SME) of H.264/AVC. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad by Ahmad, Khairul Adilah

    Published 2018
    “…Due to the inherent and uncertain variability of the Harumanis features, fuzzy learning algorithm has been designed to classify these fruits similar to the ability of human experts. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Investigation of QAM based on mean square error (MSE) channel estimation (CE) for MIMO-OFDM pilot based system / Mohd Ariff Ibrahim by Ibrahim, Mohd Ariff

    Published 2013
    “…The diversity in MIMO-OFDM is based on the lowest Bit Error Rate (BER) of each result by the estimation of Quadrature Amplitude Modulation (QAM) scheme size. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Detection of Denial of Service Attacks against Domain Name System Using Neural Networks by Rastegari, Samaneh

    Published 2009
    “…In the current research for our machine learning engine, we aimed to find the optimum machine learning algorithm to be used as an IDS. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Application of machine learning algorithms to predict the thyroid disease risk: an experimental comparative study by Islam, Saima Sharleen, Haque, Md Samiul, Miah, M. Saef Ullah, Sarwar, Talha, Nugraha, Ramdhan

    Published 2022
    “…For this reason, this study compares eleven machine learning algorithms to determine which one produces the best accuracy for predicting thyroid risk accurately. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Under-reach correction in twin circuits without residual current input from the parallel line by M.F.B., Abdullah, R.N., Mukerjee

    Published 2008
    “…The paper develops characteristic expressions for effective sequence impedances of twin circuit lines and presents a non-iterative microprocessor based algorithm for fault distance and under-reach estimation in real time, for under-reach correction in basic distance relaying scheme. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Customised fitness function of evolutionary algorithm for optimization of car park space / Ahmad Syahir Ab. Aziz by Ab. Aziz, Ahmad Syahir

    Published 2017
    “…Parking space are designed based on the three type which are parallel, diagonal, and perpendicular. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Automated detection and evaluation of ischemic stroke on ct brain imaging using machine learning techniques by Sharuddin, Nur Amirah Atikah

    Published 2025
    “…This study investigates the application of machine learning algorithms for the detection of ischemic stroke using CT brain images. …”
    Get full text
    Get full text
    Monograph