Search Results - (( wave evaluation method algorithm ) OR ( data equalization based algorithm ))

Refine Results
  1. 1
  2. 2

    Evaluation of lightning location and lightning current wave shape using measured lightning magnetic fields at two stations by Izadi, Mahdi, Ab Kadir, Mohd Zainal Abidin, Hajikhani, Maryam, Gomes, Chandima

    Published 2016
    “…In this paper, an algorithm is proposed to evaluate a lightning location as well as the lightning current wave shapes at different heights along a channel using lightning measured magnetic fields at two stations. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Factors with retirement behaviour among retirees and pre-retirees identified with a machine learning method / Muhammad Aizat Zainal Alam by Muhammad Aizat , Zainal Alam

    Published 2023
    “…The Malaysian Ageing and Retirement Survey (MARS) Data Wave 1 is used for this study where the data was sampled via multiple-stage sampling framework where each region is stratified by urban and rural areas called enumeration blocks (EBs) which are proportionate to the population size of each region across 3,384 households. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Evaluation of lightning return stroke current using measured electromagnetic fields by Mahdi, Izadi

    Published 2012
    “…This research proposed an inverse procedure algorithm using the proposed general fields’ expressions and the particle swarm optimization algorithm (PSO) in the time domain where the full channel base current wave shape in time domain can be determined. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems by Marzook, Ali Kamil, Ismail, Alyani, Mohd Ali, Borhanuddin, Sali, Aduwati, Khalaf, Mohannad H., Khatun, Sabira

    Published 2013
    “…The detectors: zero forcing block linear equalizer and minimum mean square error block linear equalizer algorithms are considered in this paper to recover the data. …”
    Get full text
    Get full text
    Article
  6. 6

    Reduced Rank Technique for Joint Channel Estimation and Joint Data Detection in TD-SCDMA Systems by Sabira, Khatun, Ali K., Marzook, Alyani, Ismail, Aduwati, Sali, Mohannad Hamed, Khalaf, Borhan, M. Ali

    Published 2012
    “…The detectors: zero forcing block linear equalizer and minimum mean square error block linear equalizer algorithms are considered in this paper to recover the data. …”
    Get full text
    Get full text
    Article
  7. 7

    Detection of defect in concrete using elastic wave tomography reconstruction technique / Liu Kit Fook by Liu, Kit Fook

    Published 2017
    “…Non-destructive evaluation (NDE) and structural health monitoring (SHM) methods have become a vital technology in civil engineering industry. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Reduced-rank technique for joint channel estimation in TD-SCDMA systems. by Ismail, Alyani, Sali, Aduwati, Mohd Ali, Borhanuddin, Khatun, Sabira

    Published 2013
    “…The detectors: zero forcing block linear equalizer and minimum mean square error block linear equalizer algorithms are considered in this paper to recover the data. …”
    Get full text
    Get full text
    Article
  9. 9

    Improved power output forecastingtechnique for effective battery management in photovoltaic system / Utpal Kumar Das by Utpal, Kumar Das

    Published 2019
    “…A PSO-based algorithm is adopted for the appropriate selection of dominated parameters of SVR-based model to achieve better performance. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Segmentation of MRI brain images using statistical approaches by Balafar, Mohammad Ali

    Published 2011
    “…Therefore, these algorithms can be improved upon. A neighbourhood-based noise-reduction algorithm which uses the edges of an image is proposed. …”
    Get full text
    Get full text
    Thesis
  11. 11

    An analytical second-FDTD method for evaluation of electric and magnetic fields at intermediate distances from lightning channell by Izadi, Mahdi, Ab Kadir, Mohd Zainal Abidin, Gomes, Chandima, Wan Ahmad, Wan Fatinhamamah

    Published 2010
    “…In this paper, by using dipole method, Maxwell equations and second order finite-difference time domain (later referred as a 2nd FDTD method) on two realistic return stroke currents, an algorithm for evaluation of electric fields is proposed, which is based on numerical methods in the time domain. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Iterative And Single-Step Solutions Of Two Dimensional Time-Domain Inverse Scattering Problem Featuring Ultra Wide Band Sensors by Binajjaj, Saeed Ali Saeed

    Published 2010
    “…First, the algorithms‘ performances were evaluated using numerical simulation employing two different scanning geometries: limited and full view scanning geometries, where the applicability of these algorithms was accessed by comparing the reconstructed images with actual model. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Enhanced handover decision algorithm in heterogeneous wireless network by Abdullah, Radhwan Mohammed, Ahmad Zukarnain, Zuriati

    Published 2017
    “…It also employs three types of vertical handover decision algorithms: equal priority, mobile priority and network priority. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Evaluation of lightning current and ground reflection factor using measured electromagnetic field by Izadi, Mahdi, Ab Kadir, Mohd Zainal Abidin, Hajikhani, Maryam

    Published 2014
    “…In order to validate the proposed method, a set of measured electromagnetic fields are used as the input parameters for the proposed algorithm. …”
    Get full text
    Get full text
    Article
  15. 15

    A comparison of watermarking image quality based on dual intermediate significant bit with genetic algorithm by Yasin, Azman, M. Zeki, Akram, Mohammed, Ghassan N.

    Published 2013
    “…In this case, when the two hidden bits are equal to the original bits, there will be no change to the other remaining bits.However, if the original value is not equal to the embedded one, the nearest pixel to the original one will be chosen as the watermarked image.The second method, GA method is used to embed two bits of watermarking data within every pixel of the original image and to find the optimal value based on the existing DISB.On the other hand, if the two embedded bits are equal to the original bits then this means the watermarked image is still the same as the original one without any changes, while in the other case GA is used in determining the minimum fitness value in which the fittest is the absolute value between the pixel and chromosome and the value of chromosome between 0-255.The results indicate that the two methods produce a high quality watermarked image, but there is a big difference in the processing time, so the DISB method is faster than the GA method.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17
  18. 18

    Adjusted 0-1 knapsack problem in cargo flow by using artificial bee colony algorithm / Nor Zuliiziati Md Jani by Md Jani, Nor Zuliiziati

    Published 2021
    “…With its total value as much as possible, the number of items that may become less or at least equal to or equal to the limit. The aim of this research is to determine the flow of the shipment based on volume and to determine the total cost based on the flow of shipment by using Artificial Bee Colony (ABC) algorithm. …”
    Get full text
    Get full text
    Student Project
  19. 19

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…The best accuracy result of 99.97% is obtained when the model operates in a hybrid mode based on a combination of PCA, LDA and RF algorithms, and the data reduction parameter equals 40.…”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A.

    Published 2022
    “…The best accuracy result of 99.97% is obtained when the model operates in a hybrid mode based on a combination of PCA, LDA and RF algorithms, and the data reduction parameter equals 40…”
    Get full text
    Get full text
    Get full text
    Article