Search Results - (( rate detection path algorithm ) OR ( panel estimation methods algorithm ))
Search alternatives:
- estimation methods »
- methods algorithm »
- panel estimation »
- rate detection »
- detection path »
- path algorithm »
-
1
Robust estimation methods for fixed effect panel data model having block-concentrated outliers
Published 2019“…The Ordinary Least Squares (OLS) is the commonly used method to estimate the parameters of fixed effect panel data model. …”
Get full text
Get full text
Thesis -
2
A generalized laser simulator algorithm for mobile robot path planning with obstacle avoidance
Published 2022“…According to the results, the GLS algorithm outperformed the original laser simulator (LS) method in path and success rate. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Safe avoidance path detection using multi sensor integration for small unmanned aerial vehicle
Published 2018“…In the experiment conducted, we successfully detect and create a safe avoidance path for both situations. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Implementation of a modified incremental conductance MPPT algorithm with direct control based on a fuzzy duty cycle change estimator using dSPACE
Published 2014“…A controlled Cuk DC-DC converter was implemented and connected to a SunTech STP085B PV panel to verify the accuracy of the proposed method. …”
Get full text
Article -
5
Identification and mitigation of non-line-of-sight path effect using repeater for hybrid ultra-wideband positioning and networking system
Published 2021“…Hence, a higher probability of accuracy across the entire tested area can be achieved for the UWB positioning system by mitigating the NLOS path effect using the proposed algorithm. Besides that, the transmission of the line-of-sight (LOS) signal attains a data rate of around 15 times higher than the NLOS signal at a bit-error-rate (BER) of 10-5 in the indoor networking system. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
6
Performance analyses of various photovoltaic power plant based on local spectral irradiances in Malaysia using genetic algorithm
Published 2023“…Besides, the genetic algorithm has showed that it is an effective and efficient way to perform estimation of optimal tilt angle and orientation angle for solar sites with genetic algorithm as it is able to produce correct and accurate result in a short amount of time.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics
Published 2023“…These metrics use network resources to determine the number of vulnerabilities and the network's weakest path. This work aims to generate a faster and less complexity attack graph and enhance the attack graph analysis to improve the detection and prediction of the attack, the attack's next step, and discover the weakest path that an attacker might use. …”
Get full text
Get full text
Get full text
Thesis -
8
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…On the other hand, the detection algorithm based on the energy consumption achieves PDR of 91.6%, EED of 14.03 ms and detection rate accuracy of 93%. …”
Get full text
Get full text
Get full text
Thesis -
9
Animal voice recognition for identification (ID) detection system
Published 2011“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
10
Dog voice identification (ID) for detection system
Published 2012“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
11
Facial emotion detection using GPSO and Lucas-Kanade algorithms
Published 2010Get full text
Working Paper -
12
Novel Link Establishment Communication Scheme against Selfish Attack Using Node Reward with Trust Level Evaluation Algorithm in MANET
Published 2022“…Lower trust level node is selfish node and they are detected and ignored from path. It increases the lifespan of network and throughput and minimizes the end to end delay and energy consumption. …”
Get full text
Get full text
Article -
13
Modeling and analysis of the impact of information and communication technology on household consumption expenditure in different regions
Published 2022“…Based on the panel data of cities and towns in China, by using the generalized estimation method of a dynamic panel, through the construction of regional household consumption expenditure evaluation models, optimize the impact evaluation algorithm of household consumption expenditure in different regions, standardize critic indicators, and build the impact modeling of household consumption expenditure in combination with relevant algorithms such as the Engel coefficient. …”
Get full text
Get full text
Article -
14
Attack prediction to enhance attack path discovery using improved attack graph
Published 2022“…For the attack graph analysis, the random forest algorithm was used to detect, predict, and dynamically ascertain the attack location in the network. …”
Get full text
Get full text
Get full text
Article -
15
A hybrid rate control mechanism for forwarding and congestion control in named data network
Published 2020“…Named Data Networking (NDN) is an emerging Internet architecture that employs a pull-based, in-path caching, hop-by-hop, and multi-path transport architecture. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE
Published 2017“…Selected basic behaviour-based algorithms such as wallfollower, obstacle avoidance, escape route and target detection are to be combined and its efficiency is measured. …”
Get full text
Get full text
Final Year Project -
17
Obstacle detection for Unmanned Aerial Vehicle (UAV)
Published 2022“…In real-time experiment, the success rate for good texture (40%), poor texture (55%) and texture-less (45%) The findings indicate that the recommended method works well for detecting textures-less obstacle even though the success rate is only 40% because out of 10 test only one test is fail on detecting free region. …”
Get full text
Get full text
Get full text
Article -
18
Development of a prototype solar-powered autonomous vehicle prototype with object detection and avoidance system using Raspberry-Pi
Published 2024“…The vehicle uses ultrasonic sensors and a USB webcam to detect and avoid obstacles on its path with the aid of a Raspberry Pie program that effectively executes decision-making changes to manoeuvre the vehicle away from objects on a free path. …”
Get full text
Get full text
Get full text
Article -
19
Development of a State-Space Observer for Active Noise Control Systems
Published 2009“…The criterions of success considered the evaluation process are the length of the propagation path, level of cancellation, convergence rate, number of modes of each path, and destructive interferences occur at the cancellation path. …”
Get full text
Get full text
Thesis -
20
