Search Results - (( site detection method algorithm ) OR ( using function method algorithm ))
Search alternatives:
- method algorithm »
- function method »
- site detection »
- using function »
-
1
Pipeline condition assessment by instantaneous frequency response over hydroinformatics based technique—An experimental and field analysis
Published 2021“…The results showed that, although with a low ratio of signal-to-noise, the proposed method could be used as an automatic selector for Intrinsic Mode Function (IMF). …”
Get full text
Get full text
Get full text
Article -
2
Leak localization using empirical mode decomposition and teager-kaiser energy operator analysis based on pressure transient signal: experimental study
Published 2019“…This paper focused on leak identification and localization using Teiger-Kaiser Energy Operator (TKEO) as instantaneous frequency analysis (IFA) while Empirical Mode Decomposition (EMD) as decomposition method with implementation of Integrated Kurtosis Algorithm for Z-Filter (Ikaz) to Kurtosis ratio as the automatic selection criterion for intrinsic mode function (IMF). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…Finally, the verification on the two additional sites of FD algorithm has detected the 'No Fault' and 'Fault' as suggested by the type of failure occurrence and failure identification technique.…”
Get full text
Get full text
Thesis -
4
Web application vulnerabilities detection model
Published 2016“…The evaluation of the proposed method is via detection accuracy of each web vulnerability.…”
Get full text
Get full text
Research Reports -
5
Wind direction and speed estimation for quadrotor based gas tracking robot
Published 2017“…In gas extraction sites, the incidents of gas leaking poses a damage to workers on site. …”
Get full text
Book Section -
6
Optimized techniques for landslide detection and characteristics using LiDAR data
Published 2018“…The overall accuracy of the Support Vector Machine SVM and Random Forest RF classifiers revealed that three of the six algorithms exhibited higher ranks in the landslide detection. …”
Get full text
Get full text
Get full text
Thesis -
7
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…In this research, an approach has been proposed that explores the combination of genetic algorithms with static analysis, and a code replacement method to address the problem of XSS at the source code level. …”
Get full text
Get full text
Thesis -
8
Hybrid honey badger algorithm with artificial neural network (HBA-ANN) for website phishing detection
Published 2024“…Artificial Neural Network (ANN) is one popular method for website phishing detection. ANN is capable of detecting phishing websites by identifying patterns and characteristics connected to phishing websites through a network training phase. …”
Get full text
Get full text
Get full text
Article -
9
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
Conference Paper -
10
Finding the root of nonlinear function using five bracketing method / Nur Afiqah Mohamed Azhar
Published 2019“…Therefore, numerical method in the form of bracketing method is often used to find only the approximate root of the function. …”
Get full text
Get full text
Thesis -
11
Twisted pair cable fault diagnosis via random forest machine learning
Published 2022“…This paper presents a fault diagnosis method for twisted pair cable fault detection based on knowledge-based and data-driven machine learning methods. …”
Get full text
Get full text
Get full text
Article -
12
Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions
Published 2018“…The second technique is to solve bi-objective functions by using the BOBAT algorithm. The third technique is an integration of BOGSA with BOBAT to produce a BOGSBAT algorithm. …”
Get full text
Get full text
Thesis -
13
Real-Time Detection of Personal Protective Equipment for Site Safety Using Deep Learning Techniques
Published 2022Get full text
Get full text
Undergraduates Project Papers -
14
Determining the preprocessing clustering algorithm in radial basis function neural network
Published 2008“…Three types of method used in this study to find the centres include random selections, K-means clustering algorithm and also K-median clustering algorithm. …”
Get full text
Get full text
Article -
15
Cheating Detection in Examinations Using Improved YOLOv8 with Attention Mechanism
Published 2024“…To improve the speed of video detection, a student's abnormal-behavior detection method was proposed based on improved YOLOv8 and attention mechanism to achieve real-time detection of cheating actions in an exam room on a regular performance computer. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
An object-based approach to detect tree stumps in a selective logging area using Unmanned Aerial Vehicle imagery
Published 2021“…Feature extraction and segmentation images to extract stumps from a UAV scene of a forested area in Ulu Jelai, Pahang provides a quick, automated method for identifying stumps. This research implemented a technique for detecting, segmenting, classifying, and measuring tree stumps by using the Multiresolution Segmentation Algorithm method. …”
Get full text
Get full text
Get full text
Article -
17
Whole-exome sequencing and bioinformatic analyses revealed differences in gene mutation profiles in papillary thyroid cancer patients with and without benign thyroid goitre backgro...
Published 2023“…Protein-protein interaction (PPI) enrichment of the tumour-related genes was analysed using Metascape and MCODE algorithm. Results: PCA plots showed distinctive SNV profiles among the three groups. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
18
Genetic Algorithms In Optimizing Membership Function For Fuzzy Logic Controller
Published 2010“…Thus it is important to select the accurate membership functions but these methods possess one common weakness where conventional FLC use membership function and control rules generated by human operator. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
The efficiency of conjugate gradient methods with global convergence / Siti Nur Hafiza Shamsudin
Published 2019“…The global convergence result is established using exact line searches. Numerical result shows that algorithm 2 which is one of the proposed CG methods is more efficiency when compared to other algorithms.…”
Get full text
Get full text
Thesis -
20
Statistical data preprocessing methods in distance functions to enhance k-means clustering algorithm
Published 2018“…It shows that the IQR-HEOM method is more efficient to rectify the problem caused by using range in HEOM. …”
Get full text
Get full text
Get full text
Thesis
