Search Results - (( parallel optimization path algorithm ) OR ( variable detection process algorithm ))
Search alternatives:
- parallel optimization »
- variable detection »
- optimization path »
- detection process »
- process algorithm »
- path algorithm »
-
1
Tool path generation of contour parallel based on ant colony optimisation
Published 2016“…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
Get full text
Get full text
Article -
2
Minimizing machining airtime motion with an ant colony algorithm
Published 2016Get full text
Get full text
Article -
3
-
4
Development of fault detection, diagnosis and control system identification using multivariate statistical process control (MSPC)
Published 2006“…In this research work, an FDD algorithm is developed using MSPC and correlation coefficients between process variables. …”
Get full text
Get full text
Monograph -
5
Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib
Published 2019“…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
Get full text
Get full text
Get full text
Thesis -
6
Fault diagnostic algorithm for precut fractionation column
Published 2004“…This paper presents an algorithm which can be used to detect and diagnose unexpected process faults in the operation of fatty acid precut fractionation column. …”
Get full text
Get full text
Conference or Workshop Item -
7
Fault detection and diagnosis for gas density monitoring using multivariate statistical process control
Published 2011“…Therefore, an efficient fault detection and diagnosis algorithm needs to be developed to detect faults that are present in a process and pinpoint the cause of these detected faults. …”
Get full text
Get full text
Get full text
Article -
8
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023“…This technique enables an agent to update its norms even in the absence of sanctions from a third-party enforcement authority as found in some work, which entail sanctions by a third-party to detect and identify the norms. The PNDT consists of five components: agent's belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent's belief base with new normative protocol. …”
Short Survey -
9
Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti...
Published 2018“…In ArcGlS software, DEM data will be process by using terrain roughness model that has been derived by using Slope Variability algorithm. …”
Get full text
Get full text
Thesis -
10
Coronary artery stenosis detection and visualization / Tang Sze Ling
Published 2015“…The performance evaluation results show that the stenosis detection algorithm performs better average sensitivity than several state-of-the-art algorithms.…”
Get full text
Get full text
Thesis -
11
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2013“…This technique enables an agent to update its norms even in the absence of sanctions from a third-party enforcement authority as found in some work, which entail sanctions by a third-party to detect and identify the norms. The PNDT consists of five components: agent’s belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent’s belief base with new normative protocol. …”
Get full text
Get full text
Article -
12
A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors
Published 2008“…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
Get full text
Thesis -
13
Image Based Congestion Detection Algorithms And Its Real Time Implementation
Published 2015“…The proposed system uses a fast and reliable method to detect traffic congestions. The methodology includes vehicle detection by using backlight pairing feature algorithm and modified Watershed algorithm. …”
Get full text
Get full text
Thesis -
14
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
15
Development of a rule-based fault diagnostic advisory system for precut fractionation column
Published 2005“…Although the scheme was developed based on data of fatty acid precut fractionation column, the algorithm of fault detection and diagnosis can be extended to other chemical process by changing the x-MR chart and HAZOP for each selected monitoring variables.…”
Get full text
Get full text
Thesis -
16
An Automated Method For Model-Plant Mismatch Detection And Correction In Process Plants Employing Model Predictive Control (MPC)
Published 2012“…Testing for various mismatch scenarios for both two major contributors to the process, the algorithm was able to bring the output back to the desired set-point in a very short time.…”
Get full text
Get full text
Final Year Project -
17
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Monograph -
18
Development of cellular neural network algorithm for detecting lung cancer symptoms
Published 2012Get full text
Working Paper -
19
Enhancement of Space-Time Receiver Structure with Multiuser Detection for Wideband CDMA Communication Systems
Published 2006“…In this thesis, a combination of spatial signal processing with temporal signal processing is proposed. …”
Get full text
Get full text
Thesis -
20
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…System identification is a method of determining a mathematical relation between variables and terms of a process based on observed input-output data. …”
Get full text
Get full text
Get full text
Article
