Search Results - (( parameter detection method algorithm ) OR ( using function modified algorithm ))
Search alternatives:
- parameter detection »
- function modified »
- method algorithm »
- using function »
-
1
Parameter estimation of multicomponent transient signals using deconvolution and ARMA modelling techniques
Published 2003“…In this method of analysis the exponential signal is converted to a convolution model whose input is a train of weighted delta function that contains the signal parameters to be determined.The resolution of the estimated decay rates is poor if the conventional fast Fourier transform (FFT) algorithm is used to analyse the resulting deconvolved data. …”
Get full text
Get full text
Get full text
Article -
2
Power System State Estimation In Large-Scale Networks
Published 2010“…Also the WLS algorithm is modified to include Unified Power Flow Controller (UPFC) parameters. …”
Get full text
Get full text
Thesis -
3
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
Get full text
Get full text
Thesis -
4
Modelling of cupping suction system based on system identification method
Published 2022“…The detection of cupped suction system plants using a standard model based on a modified Sine Cosine Algorithm (mSCA) is presented in this research. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Structural health monitoring using adaptive wavelet functions / Seyed Hossein Mahdavi
Published 2016“…As a consequence, the computational performance of structural health monitoring strategies will be directly influenced by the higher computational competency and convergence rate of the proposed wavelet-based method for structural simulation. Accordingly, in the second part of this research, the procedure of structural identification and damage detection has been developed by employing the wavelet-based method through the modified genetic algorithms (GAs) to optimally solve inverse problems. …”
Get full text
Get full text
Thesis -
6
Parametric and Semiparametric Competing Risks Models for Statistical Process Control with Reliability Analysis
Published 2004“…A simulation data using subdistribution function for the two types of failure are carried out to compare the performance of the modified model. …”
Get full text
Get full text
Thesis -
7
Modified Seird model: a novel system dynamics approach in modelling the spread of Covid-19 in Malaysia during the pre-vaccination period
Published 2023“…The mathematical model is solved numerically using built-in Python function ‘odeint’ from the Scipy library, which by default uses LSODA algorithm from the Fortran library Odepack that adopts the integration method of non-stiff Adams and stiff Backward Differentiation (BDF) with automatic stiffness detection and switching. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Modeling of cupping suction system based on system identification method
Published 2022“…The transfer function model also makes use of a continuous-time transfer function. …”
Get full text
Get full text
Undergraduates Project Papers -
9
-
10
Optimization of modified Bouc–Wen model for magnetorheological damper using modified cuckoo search algorithm
Published 2021“…The newly proposed algorithm was tested using a set of standard benchmark functions with different searching space and global optima placement. …”
Get full text
Get full text
Get full text
Article -
11
Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor
Published 2017“…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
Get full text
Get full text
Get full text
Thesis -
12
Modified multi verse optimizer for solving optimization problems using benchmark functions
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam
Published 2011“…This study verifies the use of the proposed weighting method by Fayyadh and Abdul Razak (2011a) for damage detection algorithms applied on cracked steel beam. …”
Get full text
Get full text
Get full text
Article -
14
Weighting method for modal parameter based damage detection algorithms
Published 2011Get full text
Get full text
Article -
15
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
Get full text
Get full text
Get full text
Article -
16
Estimation of the denitrification in the lower Mississippi Valley
Published 2001“…The CREAMS denitrification algorithm was modified to account for the high soil moisture conditions by incorporating a water function.The average annual denitrification value simulated by using modified algorithm was higher than the one predicted by CREAMS algorithm.This result is expected because the modified algorithm uses a water function to reflect the degree of soil saturation.…”
Get full text
Get full text
Conference or Workshop Item -
17
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
18
Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm
Published 2014“…This study focuses on using GSA method, a new computational intelligence algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
20
Binary whale optimization algorithm with logarithmic decreasing time-varying modified sigmoid transfer function for descriptor selection problem
Published 2023“…This work introduced a new Binary Whale Optimization Algorithm, which utilized a novel time-varying modified Sigmoid transfer function with a modified logarithmic decreasing time-varying update strategy to improve the balancing of exploration and exploitation in WOA. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
