Search Results - (( wave evaluation method algorithm ) OR ( variable detection method algorithm ))

Refine Results
  1. 1

    A peer-to-peer blockchain based interconnected power system by Ahmed, Musse Mohamud, Mohammad Kamrul, Hasan, Muhammad, Shafiq, Md Ohirul, Qays, Gadekallu, Thippa Reddy, Nebhen, Jamel, Shayla, Islam

    Published 2021
    “…It describes the simulation analysis and reduction of harmonics detection in a peer-to-peer interconnected 3-phase power system with the help of an FFT algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Evaluation of lightning location and lightning current wave shape using measured lightning magnetic fields at two stations by Izadi, Mahdi, Ab Kadir, Mohd Zainal Abidin, Hajikhani, Maryam, Gomes, Chandima

    Published 2016
    “…In this paper, an algorithm is proposed to evaluate a lightning location as well as the lightning current wave shapes at different heights along a channel using lightning measured magnetic fields at two stations. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Robust diagnostics and variable selection procedure based on modified reweighted fast consistent and high breakdown estimator for high dimensional data by Baba, Ishaq Abdullahi

    Published 2022
    “…The results obtained from the simulation study and real data sets indicate that the proposed method possesses high detection power with minimal misclassification error compared to the MRCD and MDP methods. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Evaluation of lightning return stroke current using measured electromagnetic fields by Mahdi, Izadi

    Published 2012
    “…This research proposed an inverse procedure algorithm using the proposed general fields’ expressions and the particle swarm optimization algorithm (PSO) in the time domain where the full channel base current wave shape in time domain can be determined. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti... by Mohd Sayud, Nur Asikin

    Published 2018
    “…In this study, several models has been created which are from QPS Fledermaus model, BTM model and Slope Variability model. Slope variability model is an algorithm that is being used for detecting terrain roughness. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Fault diagnostic algorithm for precut fractionation column by Heng, H. Y., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2004
    “…Hazard and Operability Study (HAZOP) is used to support the diagnosis task. The algorithm has been successful in detecting the deviations of each variable by testing the data set. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    A real time road marking detection system on large variability road images database by Khan, Bahadur Shah, Hanafi, Marsyita, Mashohor, Syamsiah

    Published 2017
    “…One of the first embedded system is a lane detection system, which was implemented using road marking detection algorithms with the aim to produce a system that is able to detect various shapes of road markings on the images that are captured under various imaging conditions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Coronary artery stenosis detection and visualization / Tang Sze Ling by Tang, Sze Ling

    Published 2015
    “…In contrast to the conventional methods which perform detection from a single image, the stenosis detection algorithm using two images from various view angles to avoid false positive (stenosis overestimated) and false negative (stenosis underestimated). …”
    Get full text
    Get full text
    Thesis
  10. 10

    Multi road marking detection system for autonomous car using hybrid- based method by Shah, Khan Bahadur

    Published 2018
    “…The proposed system consists of a combination of Inverse Perspective Transform method, an image enhancement method and edge detection method. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Detection of defect in concrete using elastic wave tomography reconstruction technique / Liu Kit Fook by Liu, Kit Fook

    Published 2017
    “…Non-destructive evaluation (NDE) and structural health monitoring (SHM) methods have become a vital technology in civil engineering industry. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Monograph
  13. 13
  14. 14

    Integrated face detection approach for far image application by Salka, Tanko Daniel

    Published 2016
    “…The noise reduction method in the proposed algorithm consists of a combination of a morphological filter and a rejection method. …”
    Get full text
    Get full text
    Thesis
  15. 15

    An analytical second-FDTD method for evaluation of electric and magnetic fields at intermediate distances from lightning channell by Izadi, Mahdi, Ab Kadir, Mohd Zainal Abidin, Gomes, Chandima, Wan Ahmad, Wan Fatinhamamah

    Published 2010
    “…In this paper, by using dipole method, Maxwell equations and second order finite-difference time domain (later referred as a 2nd FDTD method) on two realistic return stroke currents, an algorithm for evaluation of electric fields is proposed, which is based on numerical methods in the time domain. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Iterative And Single-Step Solutions Of Two Dimensional Time-Domain Inverse Scattering Problem Featuring Ultra Wide Band Sensors by Binajjaj, Saeed Ali Saeed

    Published 2010
    “…First, the algorithms‘ performances were evaluated using numerical simulation employing two different scanning geometries: limited and full view scanning geometries, where the applicability of these algorithms was accessed by comparing the reconstructed images with actual model. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Image Based Congestion Detection Algorithms And Its Real Time Implementation by Khdiar, Ahmed Nidhal

    Published 2015
    “…The proposed system uses a fast and reliable method to detect traffic congestions. The methodology includes vehicle detection by using backlight pairing feature algorithm and modified Watershed algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Fault detection and diagnosis for gas density monitoring using multivariate statistical process control by Norul Shahida, Che Din, Noor Asma Fazli, Abdul Samad, Chin, Sim Yee

    Published 2011
    “…Results show that method based on PCA and PCorrA was able to detect the pre-designed faults successfully and identify variables which cause the faults.…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Automated QT interval measurement using modified Pan-Tompkins algorithm with independent isoelectric line approach by Jumahat, Shaliza, Gan, Kok Beng, Misran, Norbahiah, Islam, Mohammad Tariqul, Mahri, Nurhafizah, Ja'afar, Mohd. Hasni

    Published 2020
    “…This method uses an improved Pan-Tompkins algorithm from the previous work with independent of the isoelectric line approach for detecting the QRS onset and the T offset. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis