Search Results - (( rate detection path algorithm ) OR ( panel estimation methods algorithm ))

Refine Results
  1. 1

    Robust estimation methods for fixed effect panel data model having block-concentrated outliers by Abu Bakar @ Harun, Nor Mazlina

    Published 2019
    “…The Ordinary Least Squares (OLS) is the commonly used method to estimate the parameters of fixed effect panel data model. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    Implementation of a modified incremental conductance MPPT algorithm with direct control based on a fuzzy duty cycle change estimator using dSPACE by Radjai, T., Rahmani, L., Mekhilef, Saad, Gaubert, J.P.

    Published 2014
    “…A controlled Cuk DC-DC converter was implemented and connected to a SunTech STP085B PV panel to verify the accuracy of the proposed method. …”
    Get full text
    Article
  5. 5

    Identification and mitigation of non-line-of-sight path effect using repeater for hybrid ultra-wideband positioning and networking system by Chung, Gwo Chin, Mohd. Aqmal Syafiq Kamarudin, Lee, It Ee, Tan, Soo Fun

    Published 2021
    “…Hence, a higher probability of accuracy across the entire tested area can be achieved for the UWB positioning system by mitigating the NLOS path effect using the proposed algorithm. Besides that, the transmission of the line-of-sight (LOS) signal attains a data rate of around 15 times higher than the NLOS signal at a bit-error-rate (BER) of 10-5 in the indoor networking system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Performance analyses of various photovoltaic power plant based on local spectral irradiances in Malaysia using genetic algorithm by Lim, Song Wei

    Published 2023
    “…Besides, the genetic algorithm has showed that it is an effective and efficient way to perform estimation of optimal tilt angle and orientation angle for solar sites with genetic algorithm as it is able to produce correct and accurate result in a short amount of time.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics by Al-Araji, Zaid Jasim Mohammed

    Published 2023
    “…These metrics use network resources to determine the number of vulnerabilities and the network's weakest path. This work aims to generate a faster and less complexity attack graph and enhance the attack graph analysis to improve the detection and prediction of the attack, the attack's next step, and discover the weakest path that an attacker might use. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…On the other hand, the detection algorithm based on the energy consumption achieves PDR of 91.6%, EED of 14.03 ms and detection rate accuracy of 93%. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Animal voice recognition for identification (ID) detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2011
    “…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Dog voice identification (ID) for detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2012
    “…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    Novel Link Establishment Communication Scheme against Selfish Attack Using Node Reward with Trust Level Evaluation Algorithm in MANET by Hemalatha, S., Kshirsagar, P.R., Manoharan, H., Vasantha Gowri, N., Vani, A., Qaiyum, S., Vijayakumar, P., Tirth, V., Haleem, S.L.A., Chakrabarti, P., Teressa, D.M.

    Published 2022
    “…Lower trust level node is selfish node and they are detected and ignored from path. It increases the lifespan of network and throughput and minimizes the end to end delay and energy consumption. …”
    Get full text
    Get full text
    Article
  13. 13

    Modeling and analysis of the impact of information and communication technology on household consumption expenditure in different regions by Fan, Chaozhi, Law, Siong Hook, Ibrahim, Saifuzzaman, Naseem, N. A. M.

    Published 2022
    “…Based on the panel data of cities and towns in China, by using the generalized estimation method of a dynamic panel, through the construction of regional household consumption expenditure evaluation models, optimize the impact evaluation algorithm of household consumption expenditure in different regions, standardize critic indicators, and build the impact modeling of household consumption expenditure in combination with relevant algorithms such as the Engel coefficient. …”
    Get full text
    Get full text
    Article
  14. 14

    Attack prediction to enhance attack path discovery using improved attack graph by Al-Araji, Zaid Jasim, Abdullah, Raihana Syahirah, Syed Ahmad, Sharifah Sakinah

    Published 2022
    “…For the attack graph analysis, the random forest algorithm was used to detect, predict, and dynamically ascertain the attack location in the network. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    A hybrid rate control mechanism for forwarding and congestion control in named data network by Alsamman, Mohammed Gamal

    Published 2020
    “…Named Data Networking (NDN) is an emerging Internet architecture that employs a pull-based, in-path caching, hop-by-hop, and multi-path transport architecture. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE by ABDUL RAZAK, NUSRAH

    Published 2017
    “…Selected basic behaviour-based algorithms such as wallfollower, obstacle avoidance, escape route and target detection are to be combined and its efficiency is measured. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Obstacle detection for Unmanned Aerial Vehicle (UAV) by Abdul Khaliq, Nor Aizatul Nabila, Ramli, Muhammad Faiz

    Published 2022
    “…In real-time experiment, the success rate for good texture (40%), poor texture (55%) and texture-less (45%) The findings indicate that the recommended method works well for detecting textures-less obstacle even though the success rate is only 40% because out of 10 test only one test is fail on detecting free region. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Development of a prototype solar-powered autonomous vehicle prototype with object detection and avoidance system using Raspberry-Pi by Ogonye, O. Solomon, Dagwa Ishaya Musa, Nurudeen Abdulhakeem Hassan, Okonkwo, Emmanuel, Kulutuye, Precious

    Published 2024
    “…The vehicle uses ultrasonic sensors and a USB webcam to detect and avoid obstacles on its path with the aid of a Raspberry Pie program that effectively executes decision-making changes to manoeuvre the vehicle away from objects on a free path. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Development of a State-Space Observer for Active Noise Control Systems by Muhssin, Mazin T.

    Published 2009
    “…The criterions of success considered the evaluation process are the length of the propagation path, level of cancellation, convergence rate, number of modes of each path, and destructive interferences occur at the cancellation path. …”
    Get full text
    Get full text
    Thesis
  20. 20