Search Results - (( site detection method algorithm ) OR ( based information flow algorithm ))
Search alternatives:
- based information »
- method algorithm »
- information flow »
- site detection »
- flow algorithm »
-
1
Distribution network fault section estimation using analytical database approach
Published 2004“…The method IS based on an analytical database approach which uses a power flow and fault analysis program to establish analytical voltage sag databases for a typical studied distribution network topology. …”
Get full text
Get full text
Get full text
Thesis -
2
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…Finally, the verification on the two additional sites of FD algorithm has detected the 'No Fault' and 'Fault' as suggested by the type of failure occurrence and failure identification technique.…”
Get full text
Get full text
Thesis -
3
Web application vulnerabilities detection model
Published 2016“…The evaluation of the proposed method is via detection accuracy of each web vulnerability.…”
Get full text
Get full text
Research Reports -
4
Wind direction and speed estimation for quadrotor based gas tracking robot
Published 2017“…In gas extraction sites, the incidents of gas leaking poses a damage to workers on site. …”
Get full text
Book Section -
5
Optimized techniques for landslide detection and characteristics using LiDAR data
Published 2018“…The overall accuracy of the Support Vector Machine SVM and Random Forest RF classifiers revealed that three of the six algorithms exhibited higher ranks in the landslide detection. …”
Get full text
Get full text
Get full text
Thesis -
6
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…In this research, an approach has been proposed that explores the combination of genetic algorithms with static analysis, and a code replacement method to address the problem of XSS at the source code level. …”
Get full text
Get full text
Thesis -
7
Cost-based hybrid flow shop scheduling with uniform machine optimization using an improved tiki-taka algorithm
Published 2024“…The cost-based HFSS model and TTA algorithm have been tested using benchmark and case study problems. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Hardware development of ultrasonics tomography for composition determination of water and oil flow
Published 2007“…The composition of the flow is determined based on the propagation time of the ultrasonic waves. …”
Get full text
Get full text
Article -
9
Response surface analysis, clustering, and random forest regression of pressure in suddenly expanded high-speed aerodynamic flows
Published 2020“…Experimental analysis of base pressure in suddenly expanded compressible flow from nozzles at different Mach numbers are performed. …”
Get full text
Get full text
Get full text
Article -
10
Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack
Published 2008“…To achieve such a goal, this research improves the Intention-driven ICMP traceback model by filtering normal flow in the specific short time and two new algorithms in UDP-based and TCP-based attack are applied. …”
Get full text
Get full text
Thesis -
11
Treemap algorithm for dynamic stormwater infiltration movement into soil surface
Published 2015“…Tree algorithm is used to re-class and provides hierarchical depth of the soil where the depth are divided into five hierarchies (40cm, 80cm, 120cm, 160cm and 20cm) based on subsurface flow wetting range. …”
Get full text
Get full text
Get full text
Proceeding -
12
Treemap algorithm for dynamic stormwater infiltration movement into soil surface
Published 2015“…Tree algorithm is used to re-class and provides hierarchical depth of the soil where the depth are divided into five hierarchies (40cm, 80cm, 120cm, 160cm and 20cm) based on subsurface flow wetting range. …”
Get full text
Get full text
Conference or Workshop Item -
13
Hybrid honey badger algorithm with artificial neural network (HBA-ANN) for website phishing detection
Published 2024“…Artificial Neural Network (ANN) is one popular method for website phishing detection. ANN is capable of detecting phishing websites by identifying patterns and characteristics connected to phishing websites through a network training phase. …”
Get full text
Get full text
Get full text
Article -
14
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
Conference Paper -
15
Twisted pair cable fault diagnosis via random forest machine learning
Published 2022“…This paper presents a fault diagnosis method for twisted pair cable fault detection based on knowledge-based and data-driven machine learning methods. …”
Get full text
Get full text
Get full text
Article -
16
Real-Time Detection of Personal Protective Equipment for Site Safety Using Deep Learning Techniques
Published 2022Get full text
Get full text
Undergraduates Project Papers -
17
-
18
Cheating Detection in Examinations Using Improved YOLOv8 with Attention Mechanism
Published 2024“…To improve the speed of video detection, a student's abnormal-behavior detection method was proposed based on improved YOLOv8 and attention mechanism to achieve real-time detection of cheating actions in an exam room on a regular performance computer. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
An object-based approach to detect tree stumps in a selective logging area using Unmanned Aerial Vehicle imagery
Published 2021“…Feature extraction and segmentation images to extract stumps from a UAV scene of a forested area in Ulu Jelai, Pahang provides a quick, automated method for identifying stumps. This research implemented a technique for detecting, segmenting, classifying, and measuring tree stumps by using the Multiresolution Segmentation Algorithm method. …”
Get full text
Get full text
Get full text
Article -
20
