Search Results - (( parameter detection path algorithm ) OR ( data equalization based algorithm ))

Refine Results
  1. 1
  2. 2

    Path Planning and Control of Mobile Robot in Road Environments using Sensor Fusion and Active Force Control by Ali, Mohammed A. H., Mailah, Musa

    Published 2018
    “…The sensor fusion algorithm is used to remove noises and uncertainties from sensors' data and provide optimum measurements for path planning. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Surface defect detection and polishing parameter optimization using image processing for G3141 cold rolled steel by Zamri, Ruzaidi

    Published 2016
    “…To realize this, automatic cropping algorithm is developed to detect the region of interest and interpret the Ga value. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems by Marzook, Ali Kamil, Ismail, Alyani, Mohd Ali, Borhanuddin, Sali, Aduwati, Khalaf, Mohannad H., Khatun, Sabira

    Published 2013
    “…The detectors: zero forcing block linear equalizer and minimum mean square error block linear equalizer algorithms are considered in this paper to recover the data. …”
    Get full text
    Get full text
    Article
  6. 6

    Reduced Rank Technique for Joint Channel Estimation and Joint Data Detection in TD-SCDMA Systems by Sabira, Khatun, Ali K., Marzook, Alyani, Ismail, Aduwati, Sali, Mohannad Hamed, Khalaf, Borhan, M. Ali

    Published 2012
    “…The detectors: zero forcing block linear equalizer and minimum mean square error block linear equalizer algorithms are considered in this paper to recover the data. …”
    Get full text
    Get full text
    Article
  7. 7

    Reduced-rank technique for joint channel estimation in TD-SCDMA systems. by Ismail, Alyani, Sali, Aduwati, Mohd Ali, Borhanuddin, Khatun, Sabira

    Published 2013
    “…The detectors: zero forcing block linear equalizer and minimum mean square error block linear equalizer algorithms are considered in this paper to recover the data. …”
    Get full text
    Get full text
    Article
  8. 8

    Improved power output forecastingtechnique for effective battery management in photovoltaic system / Utpal Kumar Das by Utpal, Kumar Das

    Published 2019
    “…A PSO-based algorithm is adopted for the appropriate selection of dominated parameters of SVR-based model to achieve better performance. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Segmentation of MRI brain images using statistical approaches by Balafar, Mohammad Ali

    Published 2011
    “…Therefore, these algorithms can be improved upon. A neighbourhood-based noise-reduction algorithm which uses the edges of an image is proposed. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A novel bio-inspired routing algorithm based on ACO for WSNs by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A.

    Published 2019
    “…The issue of path selection to reach the nodes and vital correspondence parameters, for example, the versatility of nodes, their constrained vitality, the node residual energy and route length are considered since the communications parameters and imperatives must be taken into account by the imperative systems that mediate in the correspondence procedure, and the focal points of the subterranean insect framework have been utilized furthermore. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Enhanced handover decision algorithm in heterogeneous wireless network by Abdullah, Radhwan Mohammed, Ahmad Zukarnain, Zuriati

    Published 2017
    “…It also employs three types of vertical handover decision algorithms: equal priority, mobile priority and network priority. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    A comparison of watermarking image quality based on dual intermediate significant bit with genetic algorithm by Yasin, Azman, M. Zeki, Akram, Mohammed, Ghassan N.

    Published 2013
    “…In this case, when the two hidden bits are equal to the original bits, there will be no change to the other remaining bits.However, if the original value is not equal to the embedded one, the nearest pixel to the original one will be chosen as the watermarked image.The second method, GA method is used to embed two bits of watermarking data within every pixel of the original image and to find the optimal value based on the existing DISB.On the other hand, if the two embedded bits are equal to the original bits then this means the watermarked image is still the same as the original one without any changes, while in the other case GA is used in determining the minimum fitness value in which the fittest is the absolute value between the pixel and chromosome and the value of chromosome between 0-255.The results indicate that the two methods produce a high quality watermarked image, but there is a big difference in the processing time, so the DISB method is faster than the GA method.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Mobile robot safe navigation in unknown environment by Shayestegan, Mohsen, Marhaban, Mohammad Hamiruce

    Published 2012
    “…The information about the target and the low-range sensory information are used by the controller to produce the commands that gives a favorable direction in terms of reaching to the target within the collision detection. Furthermore, the mobile robot does not suffer from typical ushape environment by a planned local minimum trapping algorithm and also designed controller is easy to understand, simple, and not sensitive to the system model parameters. …”
    Get full text
    Conference or Workshop Item
  15. 15

    Effect of LiDAR mounting parameters and speed on HDL graph SLAM-Based 3D mapping for autonomous vehicles by Law, Jia Seng, Muhammad Aizzat, Zakaria, Younus, Maryam, Yong, Ericsson, Ismayuzri, Ishak, Mohamad Heerwan, Peeie, Muhammad Izhar, Ishak

    Published 2025
    “…Results showed that a 0° angle at 30 km/h produced the most accurate 3D map, achieving a Root Mean Square Error (RMSE) of 0.0812 for straight paths and 0.1345 for curved paths. These findings demonstrate the significance of physical mounting parameters and speed on mapping performance. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Adjusted 0-1 knapsack problem in cargo flow by using artificial bee colony algorithm / Nor Zuliiziati Md Jani by Md Jani, Nor Zuliiziati

    Published 2021
    “…With its total value as much as possible, the number of items that may become less or at least equal to or equal to the limit. The aim of this research is to determine the flow of the shipment based on volume and to determine the total cost based on the flow of shipment by using Artificial Bee Colony (ABC) algorithm. …”
    Get full text
    Get full text
    Student Project
  17. 17

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…The best accuracy result of 99.97% is obtained when the model operates in a hybrid mode based on a combination of PCA, LDA and RF algorithms, and the data reduction parameter equals 40.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A.

    Published 2022
    “…The best accuracy result of 99.97% is obtained when the model operates in a hybrid mode based on a combination of PCA, LDA and RF algorithms, and the data reduction parameter equals 40…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Ahmed Dheyab, Saad, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…The best accuracy result of 99.97% is obtained when the model operates in a hybrid mode based on a combination of PCA, LDA and RF algorithms, and the data reduction parameter equals 40.…”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama

    Published 2022
    “…The best accuracy result of 99.97% is obtained when the model operates in a hybrid mode based on a combination of PCA, LDA and RF algorithms, and the data reduction parameter equals 40.…”
    Get full text
    Get full text
    Get full text
    Article