Search Results - (( parameter detection method algorithm ) OR ( based identification based algorithm ))
Search alternatives:
- based identification »
- identification based »
- parameter detection »
- method algorithm »
-
1
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…Optimization algorithms are widely used for the identification of intrusion. …”
Get full text
Get full text
Get full text
Article -
2
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article -
3
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…This resulted in the high accuracy of the damage detection algorithm. The second proposed method seeks to identify damage in the structural parameters of linear and nonlinear systems. …”
Get full text
Get full text
Get full text
Thesis -
4
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
5
Black hole algorithm along edge detector and circular hough transform based iris projection with biometric identification systems
Published 2024“…In this study, we presented a Black Hole Algorithm (BHA) along the Canny edge detector and circular Hough transform-based optimization technique for circular parameter identification of iris segmentation. …”
Get full text
Get full text
Article -
6
Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali
Published 2024“…The objectives of this research include assessing the impact of UAV height and applying the Difference of Gaussian (DoG) Algorithms in crack identification. The goal here is to establish the level of effectiveness of the DoG algorithm in detecting cracks in images derived from orthomosaics at different heights. …”
Get full text
Get full text
Student Project -
7
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
Get full text
Get full text
Thesis -
8
Fault Detection and Identification in Quadrotor System (Quadrotor Robot)
Published 2016“…The aim of the research is to construct and design a Fault Detection and Isolation algorithm. This dynamic model is based on the first principles of the Quadrotor: Propeller model and its force as well as moments generation. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Fuzzy modelling using firefly algorithm for phishing detection
Published 2019“…One of the suitable methods provides the Firefly Algorithm (FA). FA is a nature-inspired algorithm that uses fireflies’ behavior to interpret data. …”
Get full text
Get full text
Get full text
Article -
10
DEVELOPMENT OF OE-BASED BROWN-FORSYTHE TEST ALGORITHM FOR CONTROL VALVE STICTION DETECTION
Published 2018“…Therefore, the main objective of the project is to develop an OE-based Brown-Forsythe test algorithm to effectively detect the presence of control valve stiction.In this study, the proposed OE model is developed using System Identification in MATLAB, where it is used to simulate the process output (PV). …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
11
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…After evaluating the results of these algorithms, a hybrid Artificial Neural Network-based Imperial Competitive Algorithm (ANN-ICA) was presented in the deployment step of the proposed methodology to identify the structural damage of illustrative structures. …”
Get full text
Get full text
Get full text
Thesis -
12
Novel algorithms of identifying types of partial discharges using electrical and non-contact methods / Mohammad Shukri Hapeez
Published 2015“…The PD data acquired from electrical method was used to test the FPDI. The comparison was made based on the less hardware used for detection while sustain the identification accuracy. …”
Get full text
Get full text
Thesis -
13
Twisted pair cable fault diagnosis via random forest machine learning
Published 2022“…Currently, most of the telecommunication providers monitor the network performance degradation hence troubleshoot the present of the fault by using commercial test gear on-site, which may be resolved using data analytics and machine learning algorithm. This paper presents a fault diagnosis method for twisted pair cable fault detection based on knowledge-based and data-driven machine learning methods. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Safe experimentation dynamics algorithm for identification of cupping suction based on the nonlinear Hammerstein model
Published 2023“…This research paper suggests a method to detect the cupping suction model by employing the Hammerstein model and utilizing the Safe Experimentation Dynamics (SED) algorithm. …”
Get full text
Get full text
Get full text
Article -
16
Modified least trimmed squares method for face recognition / Nur Azimah Abdul Rahim
Published 2018“…The genetic algorithm configuration for n (number of observations) and p (parameter) was changed to assess the performance of modified method. …”
Get full text
Get full text
Thesis -
17
Modelling of cupping suction system based on system identification method
Published 2022Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
-
19
Fault detection and diagnosis using rule-based support system on fatty acid fractionation column
Published 2003“…Process history based methods (rule-based feature extraction) is used to implement the FDD rule-based support system. …”
Get full text
Get full text
Article -
20
The largest studentized residual test for bad data identification in state estimation of a power system
Published 2015“…The chi-square and normalized residual tests are the common post estimation procedures usually used for detection and identification of gross errors in the estimation algorithm. …”
Get full text
Get full text
Article
