Search Results - (( based optimization based algorithm ) OR ( software identification using algorithm ))
Search alternatives:
- software identification »
- identification using »
- using algorithm »
-
1
Thermoelectric cooler identification based on continuous-time hammerstein model using metaheuristics algorithm
Published 2021“…This paper presents the identification of the Thermoelectric Cooler (TEC) plant using a novel metaheuristic called hybrid Multi-Verse Optimizer with Sine Cosine Algorithm (hMVOSCA) based continuous-time Hammerstein model. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…Optimization algorithms are widely used for the identification of intrusion. …”
Get full text
Get full text
Get full text
Article -
3
Three phase fault algorithm in distribution system by using database approach and impedance based method
Published 2012“…A three phase fault location algorithm using database and impedance based method is utilized in distribution system to locate fault which may occur in any possible fault sections and to optimize the switching operations to reduce the outage time affected by fault. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Document clustering for knowledge discovery using nature-inspired algorithm
Published 2014“…As the internet is overload with information, various knowledge based systems are now equipped with data analytics features that facilitate knowledge discovery.This includes the utilization of optimization algorithms that mimics the behavior of insects or animals.This paper presents an experiment on document clustering utilizing the Gravitation Firefly algorithm (GFA).The advantage of GFA is that clustering can be performed without a pre-defined value of k clusters.GFA determines the center of clusters by identifying documents with high force.Upon identification of the centers, clusters are created based on cosine similarity measurement.Experimental results demonstrated that GFA utilizing a random positioning of documents outperforms existing clustering algorithm such as Particles Swarm Optimization (PSO) and K-means.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Comparative Study of Weighted Product–Dijkstra’s Algorithm and All Possible Path Approach Based on Multiple Criteria and Multi-Dimensions
Published 2020“…All Possible Path Algorithm (APPA) was another algorithm that was also used to rank all the alternatives path based on multiple criteria. …”
Get full text
Get full text
Get full text
Article -
6
Taguchi's method for optimized neural network based autoreclosure in extra high voltage lines
Published 2008“…The algorithms are developed using MATLABTM software. A range of faults are simulated using SimPowerSytemsTM and the spectra of the fault data are analyzed using Fast Fourier Transform which facilitates extraction of distinct features of each fault type. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Autoreclosure in Extra High Voltage Lines using Taguchi’s Method and Optimized Neural Networks
Published 2008“…The algorithms are developed using MATLABTM software. A range of faults are simulated on EHV modeled transmission line using SimPowerSytemsTM, and the spectra of the fault data are analyzed using fast Fourier transform which facilitates extraction of distinct features of each type of fault. …”
Get full text
Get full text
Conference or Workshop Item -
8
Autoreclosure in Extra High Voltage Lines using Taguchi's Method and Optimized Neural Networks
Published 2009“…The algorithms are developed using MATLAB software. A range of faults are simulated on EHV modeled transmission line using SimPowerSytems, and the spectra of the fault data are analyzed using fast Fourier transform to extract features of each type of fault. …”
Get full text
Get full text
Conference or Workshop Item -
9
Autoreclosure in extra high voltage lines using taguchi's method and optimized neural networks
Published 2008“…The algorithms are developed using MATLABâ„¢ software. A range of faults are simulated on EHV modeled transmission line using SimPowerSytemsâ„¢, and the spectra of the fault data are analyzed using fast Fourier transform which facilitates extraction of distinct features of each type of fault. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Detecting problematic vibration on unmanned aerial vehicles via genetic-algorithm methods
Published 2024“…The fitness function with the Genetic Algorithm (GA) optimization method is tested and evaluated based on Root Mean Squared Error (RMSE), Mean Absolute Percentage Error (MAPE), and detection time. 51 sets of data have been collected using software in the loop (SITL) methods and are used to determine the effectiveness of the proposed fitness function and GA. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Detecting problematic vibration on unmanned aerial vehicles via genetic-algorithm methods
Published 2024“…The fitness function with the Genetic Algorithm (GA) optimization method is tested and evaluated based on Root Mean Squared Error (RMSE), Mean Absolute Percentage Error (MAPE), and detection time. 51 sets of data have been collected using software in the loop (SITL) methods and are used to determine the effectiveness of the proposed fitness function and GA. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Fuzzy modelling using firefly algorithm for phishing detection
Published 2019“…To generate the fuzzy parameters automatically, an optimization method is needed. One of the suitable methods provides the Firefly Algorithm (FA). …”
Get full text
Get full text
Get full text
Article -
13
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…Then a new adaptive procedure called adaptive repository (퐴푅) is developed to select the appropriate combinations of the JADE strategies and the parameter control schemes of the MDE_pBX to generate the next population based on their fitness values. The adaptive repository mechanism is a general scheme and can be embedded with high flexibility into any population-based evolutionary algorithm. …”
Get full text
Get full text
Thesis -
14
Modeling the powder compaction process using the finite element method and inverse optimization
Published 2011“…First, it presents the implementation of the cap constitutive model into ABAQUS FE software using the closest point projection algorithm. …”
Get full text
Get full text
Get full text
Article -
15
Balancing data utility versus information loss in data-privacy protection using k-Anonymity
“…Based on the classification accuracy, the optimal values of k and c are obtained, and thus, the optimal k and c can be used for kanonymity algorithm to anonymize optimal number of columns of the dataset.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Online system identification development based on recursive weighted least square neural networks of nonlinear hammerstein and wiener models.
Published 2022“…This research introduces a developed method for online system identification based on the Hammerstein and Wiener nonlinear block-oriented structure with the artificial neural networks (NN) advantages and recursive weighted least squares algorithm for optimizing neural network learning in real-time. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Direct Adaptive Predictive Control For Wastewater Treatment Plant
Published 2012“…The adaptive control structure is based on the linear model of the process and combined with numerical algorithm for subspace state space system identification (N4SID). …”
Get full text
Get full text
Conference or Workshop Item -
18
Determination of tree stem volume : A case study of Cinnamomum
Published 2013“…Simulations of the best models are done using the Maple software.…”
Get full text
Get full text
Get full text
Thesis -
19
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. …”
Get full text
Get full text
Get full text
Thesis -
20
Opposition-based Whale Optimization Algorithm
Published 2018“…In order to improve solution accuracy and reliability, this paper proposes a new algorithm based on WOA. The new algorithm called Opposition-based Whale Optimization (OWOA). …”
Get full text
Get full text
Get full text
Article
