Search Results - (( rate estimation path algorithm ) OR ( based identification _ algorithm ))*

Refine Results
  1. 1

    Identification and mitigation of non-line-of-sight path effect using repeater for hybrid ultra-wideband positioning and networking system by Chung, Gwo Chin, Mohd. Aqmal Syafiq Kamarudin, Lee, It Ee, Tan, Soo Fun

    Published 2021
    “…Although UWB positioning offers precise locality tracking, the accuracy of the estimation is greatly affected by the non-line-of-sight (NLOS) path effect. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    A Continuous Overlay Path Probing Algorithm For Overlay Networks by Feily, Maryam

    Published 2013
    “…Active measurement techniques performed by overlay nodes can provide bandwidth estimations of an end-to-end overlay path. This thesis describes a new algorithm called “COPPA,” which is an in-band path probing algorithm for measuring the end-to-end available bandwidth of an overlay path accurately and continuously. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Coordinate-Descent Adaptation over Hamiltonian Multi-Agent Networks by Azam Khalili, Vahid Vahidpour, Amir Rastegarnia, Ali Farzamnia, Teo, Kenneth Tze Kin, Saeid Sanei

    Published 2021
    “…To implement the ILMS algorithm, each node needs to receive the local estimate of the previous node on the cycle path to update its own local estimate. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Novel Link Establishment Communication Scheme against Selfish Attack Using Node Reward with Trust Level Evaluation Algorithm in MANET by Hemalatha, S., Kshirsagar, P.R., Manoharan, H., Vasantha Gowri, N., Vani, A., Qaiyum, S., Vijayakumar, P., Tirth, V., Haleem, S.L.A., Chakrabarti, P., Teressa, D.M.

    Published 2022
    “…This scheme selects genuine node for routing path production, by using the node reward with dependence level estimating algorithm to compute every node trust level and resource range, to disconnect higher trust level node and lower trust level node; higher trust level node is a genuine node which performs secure communication. …”
    Get full text
    Get full text
    Article
  5. 5

    Development of low power viterbi decoder on complex programmable logic device platform by Abu, Mohd Azlan

    Published 2018
    “…For the path metric updater unit (PMU), the traditional method of Viterbi algorithm is to store the selected minimum value of branch metric in the memory unit. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Performance Enhancement Of Ultra-Wideband Power Control Using Ranging And Narrowband Interference Mitigation by Saeed, Rashid Abdelhaleem

    Published 2008
    “…In this thesis we propose a maximum likelihood algorithm enhanced with synchronization scheme to estimate the time delay of direct-path signal in NLOS multi-path fading environment and mean acquisition time. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Recursive Subspace Identification Algorithm Using The Propagator Based Method by Jamaludin, Irma Wani, Abdul Wahab, Norhaliza

    Published 2017
    “…In this paper, the recursive subspace identification algorithm based on the propagator method which avoids the SVD computation is proposed. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Hybrid DE-PEM algorithm for identification of UAV helicopter by Tijani, Ismaila, Akmeliawati, Rini, Legowo, Ari, Budiyono, Agus, Abdul Muthalif, Asan Gani

    Published 2014
    “…Practical implications – The identification algorithm is expected to facilitate the required model development for model-based control design for autonomous helicopter development. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Smoothed functional algorithm with norm-limited update vector for identification of continuous-time fractional-order Hammerstein Models by Mok, Ren Hao, Mohd Ashraf, Ahmad

    Published 2024
    “…In particular, the standard smoothed functional algorithm (SFA) based method is modified by implementing a limit function in the update vector of the standard SFA based method to solve the issue of high tendency of divergence during the identification process. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification by Abd Samad, Md Fahmi

    Published 2011
    “…A deterministic mutation-based algorithm is introduced to overcome this problem. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Identification of continuous-time hammerstein system using sine cosine algorithm by E. F., Junis, J. J., Jui, Mohd Helmi, Suid, Mohd Ashraf, Ahmad

    Published 2019
    “…This paper presents the development of identification of continuous-time Hammerstein systems based on Sine Cosine Algorithm (SCA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Hybrid DE and PEM algorithm for identification of small scale Autonomous helicopter model by Legowo, Ari

    Published 2012
    “…A hybrid identification algorithm based on Differential Evolution (DE) and PEM is proposed in this study for effective identification of a small scale helicopter's model parameters. …”
    Get full text
    Get full text
    Monograph
  15. 15
  16. 16

    Visual servo algorithm of robot arm simulation for dynamic tracking and grasping application by Rishi Arran Suppramaniam, Mohd Hairi Mohd Zaman, Mohd Faisal Ibrahim, Seri Mastura Mustaza, Asraf Mohamed Moubark

    Published 2022
    “…Future works are required to improve the dynamic visual servo algorithm with motion planning when obstacles are present in the path of robot grasping.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Thermoelectric cooler identification based on continuous-time hammerstein model using metaheuristics algorithm by Jui, Julakha Jahan, Mohd Ashraf, Ahmad, Mohamed Sultan, Mohamed Ali, Mohd Anwar, Zawawi, Mohd Falfazli, Mat Jusof

    Published 2021
    “…This paper presents the identification of the Thermoelectric Cooler (TEC) plant using a novel metaheuristic called hybrid Multi-Verse Optimizer with Sine Cosine Algorithm (hMVOSCA) based continuous-time Hammerstein model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Statistical computing for forensic firearm pattern identification: Evaluating a fisher linear discriminant analysis-based algorithm against fixed-impulse noise by Chuan, Zun Liang, Abraham Lim, Bing Sern, Tan, Chek Cheng, Abdul Aziz, Jemain, Liong, Choong-Yeun

    Published 2025
    “…Previous studies developed a Fisher Linear Discriminant Analysis (FLDA)-based ballistic identification algorithm to address this limitation, encompassing image pre-processing, feature extraction, and identification. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Identification of power poles based on satellite stereo images using graph-cut algorithm by Qayyum, Abdul, Malik, Aamir Saeed, Mohamad Saad, Mohamad Naufal, Ahmad, Rana Fayyaz, Taun Abdullah, Taun Ab Rashid

    Published 2015
    “…In conclusion, based on the results, Our proposed Graph-Cut algorithm produces more accurate disparity maps than the existing matching algorithm used for disparity calculation.…”
    Get full text
    Get full text
    Conference or Workshop Item