Search Results - (( parameters detection method algorithm ) OR ( wave extraction method algorithm ))
Search alternatives:
- parameters detection »
- method algorithm »
- wave extraction »
-
1
Identifying and detecting unlawful behavior in video images using genetic algorithm / Shahirah Mohamed Hatim
Published 2016“…GA is used as the method of unlawful behavior detection. Previous research on GA components impact evaluation has identified selection parameter as high potential of increasing GA performance for unlawful behavior detection. …”
Get full text
Get full text
Thesis -
2
Assessment of the beach profile at Terengganu coastline / Emran Zaki Abdul Halim
Published 2024“…The method for determining the beach profile in this study involves using Google Earth Pro to extract beach profile conditions, while a coastal slope estimation algorithm will be employed for detailed in-situ analysis. …”
Get full text
Get full text
Student Project -
3
Optimizing the efficiency of Oscillating Water Column (OWC) wave energy converter using genetic algorithm
Published 2015“…This method involves an extraction of maximum incident wave energy corresponding to the wave height, determining of the best deep water length and maximizing the applied damping ratio which can lead to an increase in the pneumatic system efficiency. …”
Get full text
Get full text
Article -
4
Pattern Recognition Approach Of Stress Wave Propagation In Carbon Steel Tubes For Defect Detection
Published 2015“…The signals were then clustered using the feature extraction algorithms. This paper tested two feature extraction algorithms namely Principal Component Analysis (PCA) and Auto-Regressive (AR). …”
Get full text
Get full text
Get full text
Article -
5
Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor
Published 2017“…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
Get full text
Get full text
Get full text
Thesis -
6
Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam
Published 2011“…This study verifies the use of the proposed weighting method by Fayyadh and Abdul Razak (2011a) for damage detection algorithms applied on cracked steel beam. …”
Get full text
Get full text
Get full text
Article -
7
Weighting method for modal parameter based damage detection algorithms
Published 2011Get full text
Get full text
Article -
8
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
Get full text
Get full text
Get full text
Article -
9
Low computational complexity for optimizing energy efficiency in mm-wave hybrid precoding system for 5G
Published 2021“…Therefore, the alternating minimization algorithm enhances HP by improving the performance of the FCS through advanced phase extraction, which involves high complexity. …”
Get full text
Get full text
Article -
10
Low computational complexity for optimizing energy efficiency in mm-wave hybrid precoding system for 5G
Published 2021“…Therefore, the alternating minimization algorithm enhances HP by improving the performance of the FCS through advanced phase extraction, which involves high complexity. …”
Get full text
Get full text
Article -
11
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
12
Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm
Published 2014“…This study focuses on using GSA method, a new computational intelligence algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
14
The evolution of spectral analysis of surface wave method – a review
Published 2021“…Precise recording of amplitude value has the potential to further improve the effectiveness and develop the surface wave testing methods. Different approaches for interpreting the dispersion curve and their potential regarding sensitivity to noise, reliability, and capability to extract significant information were investigated. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…The NTLBO was proposed in this paper as an FSS mechanism; its algorithm-specific, parameter-less concept (which requires no parameter tuning during an optimization) was explored. …”
Get full text
Get full text
Get full text
Article -
16
Outlier detection in circular regression model using minimum spanning tree method
Published 2019“…The existence of outliers in a circular regression model can lead to many errors, for example in inferences and parameter estimations. Therefore, this study aims to develop new algorithms that can detect outliers by using the minimum spanning tree method. …”
Get full text
Get full text
Conference or Workshop Item -
17
Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali
Published 2024“…The key concern of this thesis is to determine the influence of flying height parameters on crack detection using UAVs. Looking at the current scenario of development and the age of the structures in urban areas, there is a high significance of efficient and accurate building inspection methods. …”
Get full text
Get full text
Student Project -
18
Fuzzy modelling using butterfly optimization algorithm for phishing detection
Published 2020“…To generate the fuzzy parameter automatically, an optimization method is required and Butterfly Optimization Algorithm (BOA) is one of the good methods to be applied. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Heuristic optimization-based wave kernel descriptor for deformable 3D shape matching and retrieval
Published 2018“…This paper presents an optimized wave kernel signature (OWKS) using a modified particle swarm optimization (MPSO) algorithm. …”
Get full text
Get full text
Article -
20
Heuristic optimization-based wave kernel descriptor for deformable 3D shape matching and retrieval
Published 2018“…This paper presents an optimized wave kernel signature (OWKS) using a modified particle swarm optimization (MPSO) algorithm. …”
Get full text
Get full text
Article
