Search Results - (( parameter evaluation path algorithm ) OR ( variable detection sensor algorithm ))

Refine Results
  1. 1

    Observer-based fault detection with fuzzy variable gains and its application to industrial servo system by Eissa, Magdy Abdullah, Sali, Aduwati, Hassan, Mohd Khair, Bassiuny, A. M., Darwish, Rania R.

    Published 2020
    “…Also, a scoring algorithm has been implemented, to evaluate the classification ability of the algorithm and the early fault detection ability. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Evaluation of robot path planning algorithms in global static environments: genetic algorithm vs ant colony optimization algorithm / Nohaidda Sariff and Norlida Buniyamin by Sariff, Nohaidda, Buniyamin, Norlida

    Published 2010
    “…Performances between both algorithms were compared and evaluated in terms of speed and number of iterations that each algorithm takes to find an optimal path within several selected environments. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    A hybrid sampling-based path planning algorithm for mobile robot navigation in unknown environments by Khaksar, Weria

    Published 2013
    “…Sampling-based motion planning is a class of randomized path planning algorithms with proven completeness. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    A multi-objective parametric algorithm for sensor-based navigation in uncharted terrains by Khaksar W., Sahari K.S.M.

    Published 2023
    “…These parameters are designed carefully to cover different requirements of the path planner. …”
    Article
  6. 6

    Deforestation detection in Kinabalu Area, Sabah, Malaysia by using multi-sensor remote sensing approach by Phua, Mui How, Tsuyuki, Satoshi

    Published 2004
    “…This paper examines use of multi-sensor remote sensing approach for deforestation detection in the tropics. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Performance comparison between genetic algorithm and ant colony optimization algorithm for mobile robot path planning in global static environment / Nohaidda Sariff by Sariff, Nohaidda

    Published 2011
    “…Subsequently, both algorithms were applied to the test environments. Finally, the performances of both algorithms were analyzed and evaluated based on the required criteria. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Monograph
  10. 10

    Cluster head selection using fuzzy logic and chaotic based genetic algorithm in wireless sensor network by Karimi, Abbas, Abedini, S. M., Zarafshan, Faraneh, Syed Mohamed, Syed Abdul Rahman Al-Haddad

    Published 2013
    “…Wireless sensor networks (WSNs) are composed of hundreds or thousands of sensor nodes in order to detect and transmit information from its surrounding environment. …”
    Get full text
    Get full text
    Article
  11. 11

    An Experiment of Ant Algorithms : Case Study of Kota Kinabalu Central Town by Nor Rafidah, Mohamad

    Published 2005
    “…The objectives of this study are to explore and evaluate the Ant System (AS) algorithm and Ant Colony System (ACS) algorithm in finding shortest paths. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Performance analysis of ZigBeePRO network using shortest path algorithm for Distributed Renewable Generation by Islam, Syed Zahurul, Othman, Mohammad Lutfi, Islam, Syed Zahidul

    Published 2021
    “…Due to this polarization effect, the brick-built type cabin at the DRG site is a consequence of a higher propagation path loss than the Iron (III)-made cabin. The other performance parameters, including network throughput, data loss, and ZigBeePRO collision, are also evaluated.…”
    Get full text
    Get full text
    Article
  13. 13

    Modelling and analysis of sensor fault tolerant control using behavioral approach to systems theory by Ng, Peng Hong

    Published 2015
    “…State observers are then implemented as the fault detection method in which the discrepancies between the measured values by the sensors and the values of the model are expressed as residuals. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    DESIGN OF SMART TRAFFIC LIGHT SYSTEM BASED ON INTERNET OF THINGS by MUHAMMAD AMIR AFIQ, MOHAMED

    Published 2018
    “…Density of the traffic is calculated by the algorithm that have various variables. This project will use Arduino as it microcontroller and the ultrasonic is used to detect the congestion. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  15. 15

    All-pass filtered x least mean square algorithm for narrowband active noise control by Mondal (Das), Kuheli, Das, Saurav, Abu, Aminudin, Hamada, Nozomu, Toh, Hoong Thiam, Das, Saikat, Faris, Waleed Fekry

    Published 2018
    “…The performance evaluation in terms of convergence speed of the proposed algorithm is validated with standard ANC without secondary path modelling. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Attack path selection optimization with adaptive genetic algorithms by Abd Rahman, A.S., Zakaria, M.N., Masrom, S.

    Published 2016
    “…It calculates the appropriate adjustments for the control parameters such as selection and crossover rate. Possible attack paths are then identified and evaluated based on an attack graph representing the network under study. …”
    Get full text
    Get full text
    Article
  18. 18

    Attack path selection optimization with adaptive genetic algorithms by Abd Rahman, A.S., Zakaria, M.N., Masrom, S.

    Published 2016
    “…It calculates the appropriate adjustments for the control parameters such as selection and crossover rate. Possible attack paths are then identified and evaluated based on an attack graph representing the network under study. …”
    Get full text
    Get full text
    Article
  19. 19

    Faulty sensor detection mechanism using multi-variate sensors in IoT by Al-Atrakchii, Khaldoon Ammar

    Published 2019
    “…Because of this, we proposed two methods for Faulty Sensor Detection and Identification mechanism based on multi-variate sensors for Smart Parking System and smart agriculture. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Transmission path optimization Based on Efficiency Communication System by Jin Fan, Kit, Guan Lim, Sin, Helen Ee Chuo, Min, Keng Tan, Ali Farzamnia, Tze, Kenneth Kin Teo

    Published 2022
    “…At the same time, the developed algorithm combines the relative position of the cluster and the base station to further improve the routing method of the sub-cluster head, Finally, the algorithm analyzes the influence of different parameters on the transmission path, and use the simulation experiments to evaluate the conclusions.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item