Search Results - (( based observational method algorithm ) OR ( java location based algorithm ))
Search alternatives:
- observational method »
- method algorithm »
- java »
-
1
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
-
3
Group formation using genetic algorithm
Published 2009“…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
4
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
Get full text
Get full text
Thesis -
5
-
6
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Modified least trimmed squares method for face recognition / Nur Azimah Abdul Rahim
Published 2018“…The genetic algorithm configuration for n (number of observations) and p (parameter) was changed to assess the performance of modified method. …”
Get full text
Get full text
Thesis -
8
Disturbance-Kalman state for linear offset free MPC
Published 2022“…Based on the drawbacks observed in those methods, a novel algorithm is proposed to guarantee offset-free MPC under model-plant mismatches and disturbances by combining the two proposed methods which are the proposed Recursive Kalman estimated state method and the proposed Disturbance-Kalman state method. …”
Get full text
Get full text
Article -
9
Research On Photovoltaic Mppt Control Method Based On Improved Bas Algorithm And Variable Step-Size Inc Method
Published 2024“…Commonly used control methods include CVT method, perturbation and observation method, and incremental conductance method. …”
Get full text
Get full text
Thesis -
10
Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions
Published 2016“…In this work, the perturb and observation (P&O) method based on duty cycle adjustment is introduced, which is modified to increase speed of the search and also to reduce the oscillation.The simulation and experimental works have been performed to investigate behavior and performance of the proposed algorithm. …”
Get full text
Get full text
Thesis -
11
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…System identification is a method of determining a mathematical relation between variables and terms of a process based on observed input-output data. …”
Get full text
Get full text
Get full text
Article -
12
A maximal-clique-based clustering approach for multi-observer multi-view data by using k-nearest neighbor with S-pseudo-ultrametric induced by a fuzzy similarity
Published 2024“…The clustering results are analyzed based on several indexes. This analysis shows the efficiency of the proposed algorithm compared to the traditional clustering methods. © The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature 2024.…”
Get full text
Get full text
Article -
13
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…The proposed method combined the New Teaching-Learning-Based Optimization Algorithm (NTLBO), Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) NTLBO algorithm with supervised machine learning techniques for Feature Subset Selection (FSS). …”
Get full text
Get full text
Get full text
Article -
14
The performance of k-means clustering method based on robust principal components
Published 2018“…The k-means clustering method is the most widely used method to group n observations into k clusters. …”
Get full text
Get full text
Article -
15
Observer-based fault detection approach using fuzzy adaptive poles placement system with real-time implementation
Published 2021“…This paper validated the system simulation by implementing fault detection algorithms by using a real-time embedded observer-based system. …”
Get full text
Get full text
Article -
16
Power Stabilization Of A Stand-Alone Solar System Using Perturb and Observe MPPT Algorithm
Published 2010“…This paper presents the method of power stabilization of a stand-alone solar system using perturb and observe (P&O) maximum power point algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
17
Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed
Published 2012“…In recent years soft computing methods like fuzzy logic and genetic algorithm are being used in modeling complex processes of hydrologic events. …”
Get full text
Get full text
Thesis -
18
Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems
Published 2019“…The performance comparison was made only between the SED based method and G-NL-SPSA based method. In addition, the average percentage of the control objective improvement retrieved from the 30 trials for each method was also observed.…”
Get full text
Get full text
Thesis -
19
Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems
Published 2019“…The performance comparison was made only between the SED based method and G-NL-SPSA based method. In addition, the average percentage of the control objective improvement retrieved from the 30 trials for each method was also observed.…”
Get full text
Get full text
Thesis -
20
Investigating the Performance of Deep Reinforcement Learning-Based MPPT Algorithm under Partial Shading Condition
Published 2024“…In this study, MATLAB models of a DRL-based MPPT algorithm were developed, tested, and compared to simulation based on two established MPPT algorithms-the Particle Swarm Optimization (PSO), and the Perturb and Observe (P&O). …”
Conference Paper
