Search Results - (( parameter detection packet algorithm ) OR ( variable extraction search algorithm ))
Search alternatives:
- parameter detection »
- variable extraction »
- detection packet »
- packet algorithm »
- search »
-
1
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…This resulted in the high accuracy of the damage detection algorithm. The second proposed method seeks to identify damage in the structural parameters of linear and nonlinear systems. …”
Get full text
Get full text
Get full text
Thesis -
2
Intelligent fault diagnosis for broken rotor bar using wavelet packet signature analysis
Published 2016“…In order to alleviate the time-variant characteristics of the wavelet packet transform coefficients, statistical parameters of wavelet packet coefficients are calculated. …”
Get full text
Get full text
Thesis -
3
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
Get full text
Get full text
Thesis -
4
Fast adaptive motion estimation search algorithm for H.264 encoder
Published 2012“…Adaptive search strategy is applied to reduce the search point in a search range. …”
Get full text
Get full text
Thesis -
5
Long-term electrical energy consumption: Formulating and forecasting via optimized gene expression programming / Seyed Hamidreza Aghay Kaboli
Published 2018“…In the developed feature selection approach, multi-objective binary-valued backtracking search algorithm (MOBBSA) is used as an efficient evolutionary search algorithm to search within different combinations of input variables and selects the non-dominated feature subsets, which minimize simultaneously both the estimation error and the number of features. …”
Get full text
Get full text
Get full text
Thesis -
6
-
7
Short-Term Electricity Price Forecasting via Hybrid Backtracking Search Algorithm and ANFIS Approach
Published 2019“…A multi-objective feature selection approach comprises of multi-objective binary-valued backtracking search algorithm (MOBBSA) as an efficient evolutionary search algorithm and ANFIS method is developed in this paper to extract the most influential subsets of input variables with maximum relevancy and minimum redundancy. …”
Get full text
Get full text
Article -
8
Mitigating Slow Hypertext Transfer Protocol Distributed Denial of Service Attacks in Software Defined Networks
Published 2021“…Genetic algorithm was used to select the Netflow features which indicates the presence of an attack and also determine the appropriate regularization parameter, C, and gamma parameter for the Support Vector Machine classifier. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
10
Bees algorithm for Forest transportation planning optimization in Malaysia
Published 2021“…Examples of algorithm that are finding their way to the forest transportation planning problem include Genetic Algorithm (GA), Particle Swarm Optimization (PSO) algorithm, Ant Colony Optimization (ACO) algorithm, Simulated Annealing (SA) algorithm and Tabu Search (TS) algorithm. …”
Get full text
Get full text
Article -
11
-
12
New synchronization protocol for distributed system with TCP extension
Published 2013“…Thus, the new protocol is available to the communicating packets across all computer networks. The new messages and parameters could add to the available option part in the TCP packet header format, which has some free places. …”
Get full text
Get full text
Thesis -
13
Short-term electricity price forecasting in deregulated electricity market based on enhanced artificial intelligence techniques / Alireza Pourdaryaei
Published 2020“…The proposed feature selection technique comprises of Multi-objective Binary-valued Backtracking Search Algorithm (MOBBSA). It is used to search within a number of input variables combinations and to select the feature subsets, which minimizes simultaneously vice-versa the estimation error and the feature numbers. …”
Get full text
Get full text
Get full text
Thesis -
14
Coronary artery stenosis detection and visualization / Tang Sze Ling
Published 2015“…First, a novel idea, the Orthogonal Planar Search (OPS) mechanism is proposed for coronary artery centerline extraction. …”
Get full text
Get full text
Thesis -
15
Adaptive Medium Access Control (ADT-MAC) Protocol for Dynamic Medical Traffic with Quality of Service (QoS) provisioning in Wireless Body Area Network (WBAN)
Published 2025“…Additionally, an M/M/l queuing algorithm with a non-preemptive priority is modeled using SimEvents in MATLAB to validate the packet delay of different priority queues. …”
Get full text
Get full text
Thesis -
16
Optimal timber transportation planning in tropical hill forest using bees algorithm
Published 2022“…This study proposed a multi-objective linear programming model with Bees algorithm (BA) to find an optimal cost TTP for extraction, forest road, and landing locations. …”
Get full text
Get full text
Thesis -
17
Strategies of Handling Different Variables Reduction for LDA
Published 2012“…The variables selection technique with local searching algorithm is manipulated. …”
Get full text
Get full text
Get full text
Article -
18
CAT CHAOTIC GENETIC ALGORITHM BASED TECHNIQUE AND HARDWARE PROTOTYPE FOR SHORT TERM ELECTRICAL LOAD FORECASTING
Published 2017“…In this research work, a modified backpropagation neural network is combined with a modified chaos-search genetic algorithm for STLF of one day and a week ahead. …”
Get full text
Get full text
Thesis -
19
Effects of Authentication of Users in Mobile Internet Protocol Version 6
Published 2004“…Presently, mobility is difficult, if not impossible to detect at the application layer though easily detectable at the network layer. …”
Get full text
Get full text
Thesis -
20
RARE: mining colossal closed itemset in high dimensional data
Published 2018“…Among the vast data mining tasks, association rules have been extensively employed so as to describe the correlations between the variables found in a dataset. The task of mining association rules highly relies on the efficiency of the algorithms to extract all frequent itemsets that exist in the database. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article
