Search Results - (( parameter detection method algorithm ) OR ( based identification using algorithm ))
Search alternatives:
- based identification »
- identification using »
- parameter detection »
- method algorithm »
- using algorithm »
-
1
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article -
2
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…Optimization algorithms are widely used for the identification of intrusion. …”
Get full text
Get full text
Get full text
Article -
3
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…This resulted in the high accuracy of the damage detection algorithm. The second proposed method seeks to identify damage in the structural parameters of linear and nonlinear systems. …”
Get full text
Get full text
Get full text
Thesis -
4
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
Get full text
Get full text
Thesis -
5
Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali
Published 2024“…The key concern of this thesis is to determine the influence of flying height parameters on crack detection using UAVs. Looking at the current scenario of development and the age of the structures in urban areas, there is a high significance of efficient and accurate building inspection methods. …”
Get full text
Get full text
Student Project -
6
Black hole algorithm along edge detector and circular hough transform based iris projection with biometric identification systems
Published 2024“…In this study, we presented a Black Hole Algorithm (BHA) along the Canny edge detector and circular Hough transform-based optimization technique for circular parameter identification of iris segmentation. …”
Get full text
Get full text
Article -
7
Fuzzy modelling using firefly algorithm for phishing detection
Published 2019“…One of the suitable methods provides the Firefly Algorithm (FA). FA is a nature-inspired algorithm that uses fireflies’ behavior to interpret data. …”
Get full text
Get full text
Get full text
Article -
8
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
Get full text
Get full text
Thesis -
9
Novel algorithms of identifying types of partial discharges using electrical and non-contact methods / Mohammad Shukri Hapeez
Published 2015“…The PD data acquired from electrical method was used to test the FPDI. The comparison was made based on the less hardware used for detection while sustain the identification accuracy. …”
Get full text
Get full text
Thesis -
10
Fault Detection and Identification in Quadrotor System (Quadrotor Robot)
Published 2016“…The aim of the research is to construct and design a Fault Detection and Isolation algorithm. This dynamic model is based on the first principles of the Quadrotor: Propeller model and its force as well as moments generation. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…After evaluating the results of these algorithms, a hybrid Artificial Neural Network-based Imperial Competitive Algorithm (ANN-ICA) was presented in the deployment step of the proposed methodology to identify the structural damage of illustrative structures. …”
Get full text
Get full text
Get full text
Thesis -
12
Twisted pair cable fault diagnosis via random forest machine learning
Published 2022“…This paper presents a fault diagnosis method for twisted pair cable fault detection based on knowledge-based and data-driven machine learning methods. …”
Get full text
Get full text
Get full text
Article -
13
DEVELOPMENT OF OE-BASED BROWN-FORSYTHE TEST ALGORITHM FOR CONTROL VALVE STICTION DETECTION
Published 2018“…Therefore, the main objective of the project is to develop an OE-based Brown-Forsythe test algorithm to effectively detect the presence of control valve stiction.In this study, the proposed OE model is developed using System Identification in MATLAB, where it is used to simulate the process output (PV). …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
14
Safe experimentation dynamics algorithm for identification of cupping suction based on the nonlinear Hammerstein model
Published 2023“…This research paper suggests a method to detect the cupping suction model by employing the Hammerstein model and utilizing the Safe Experimentation Dynamics (SED) algorithm. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Modified least trimmed squares method for face recognition / Nur Azimah Abdul Rahim
Published 2018“…The genetic algorithm configuration for n (number of observations) and p (parameter) was changed to assess the performance of modified method. …”
Get full text
Get full text
Thesis -
17
Modelling of cupping suction system based on system identification method
Published 2022Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
-
19
The largest studentized residual test for bad data identification in state estimation of a power system
Published 2015“…The chi-square and normalized residual tests are the common post estimation procedures usually used for detection and identification of gross errors in the estimation algorithm. …”
Get full text
Get full text
Article -
20
Structural health monitoring using adaptive wavelet functions / Seyed Hossein Mahdavi
Published 2016“…As a consequence, the computational performance of structural health monitoring strategies will be directly influenced by the higher computational competency and convergence rate of the proposed wavelet-based method for structural simulation. Accordingly, in the second part of this research, the procedure of structural identification and damage detection has been developed by employing the wavelet-based method through the modified genetic algorithms (GAs) to optimally solve inverse problems. …”
Get full text
Get full text
Thesis
