Search Results - (( data optimization method algorithm ) OR ( software validation using algorithm ))
Search alternatives:
- software validation »
- data optimization »
- method algorithm »
- validation using »
- using algorithm »
-
1
Autoreclosure in Extra High Voltage Lines using Taguchi’s Method and Optimized Neural Networks
Published 2008“…The algorithms are developed using MATLABTM software. A range of faults are simulated on EHV modeled transmission line using SimPowerSytemsTM, and the spectra of the fault data are analyzed using fast Fourier transform which facilitates extraction of distinct features of each type of fault. …”
Get full text
Get full text
Conference or Workshop Item -
2
Autoreclosure in Extra High Voltage Lines using Taguchi's Method and Optimized Neural Networks
Published 2009“…The algorithms are developed using MATLAB software. A range of faults are simulated on EHV modeled transmission line using SimPowerSytems, and the spectra of the fault data are analyzed using fast Fourier transform to extract features of each type of fault. …”
Get full text
Get full text
Conference or Workshop Item -
3
Autoreclosure in extra high voltage lines using taguchi's method and optimized neural networks
Published 2008“…The algorithms are developed using MATLABâ„¢ software. A range of faults are simulated on EHV modeled transmission line using SimPowerSytemsâ„¢, and the spectra of the fault data are analyzed using fast Fourier transform which facilitates extraction of distinct features of each type of fault. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Graph theory approach for managing lecturers’ schedule using graph colouring method / Siti Nor Ba Basri, Nur Su’aidah Khozaid and Farhana Hazwani Ismail
Published 2023“…By using graph theory, graph colouring techniques, and ILP validation, this work optimizes lecturers' timetable scheduling, resolving conflicts, omissions, limitations, and preferences for optimal educational scheduling and resource allocation. …”
Get full text
Get full text
Student Project -
5
Mathematical models and optimization algorithms for low-carbon Location-Inventory-Routing Problem with uncertainty
Published 2024“…When compared to the Supply Chain Guru X (SCGX) software, the proposed algorithms offer higher practical applicability.…”
Get full text
Get full text
Get full text
Thesis -
6
Variable Neighborhood Descent and Whale Optimization Algorithm for Examination Timetabling Problems at Universiti Malaysia Sarawak
Published 2025“…A constructive algorithm was developed to generate an initial feasible solution, which was subsequently refined using two primary approaches to evaluate their efficiency: Iterative Threshold Pipe Variable Neighborhood Descent (IT-PVND), and a modified Whale Optimization Algorithm (WOA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed
Published 2012“…This approach was based on fuzzy expert system (FES) using Fuzzy Toolbox of MATLAB software. Genetic algorithm (GA) was employed to adjust parameters of FES and optimize the system. …”
Get full text
Get full text
Thesis -
8
Multifunctional optimized group method data handling for software effort estimation
Published 2022“…Nevertheless, finding the best effort estimation model with good accuracy is hard to serve this purpose. Group Method of Data Handling (GMDH) algorithms have been widely used for modelling and identifying complex systems and potentially applied in software effort estimation. …”
Get full text
Get full text
Thesis -
9
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
Get full text
Get full text
Thesis -
10
Controller placement problem in the optimization of 5G based SDN and NFV architecture
Published 2021“…If the control plane fails to improve system resilience quality, A reliable RAMCP is formulated as an optimal solution for fault tolerance. Furthermore, the approach is extended with a Particle Swarm Algorithm (PSO) and presented as a hybrid RASCP to validate the optimal location and number of controllers. …”
Get full text
Get full text
Thesis -
11
Feature fusion using a modified genetic algorithm for face and signature recognition system
Published 2015“…Results show that the proposed method yield optimal recognition with the highest accuracy of 97.50%. …”
Get full text
Get full text
Thesis -
12
Multi-perspective usability evaluation with multi-criteria decision analysis for optimal selection of open-source software
Published 2021“…Hence, this research proposes a methodology for multi-perspective usability evaluation with multi-criteria decision analysis for optimal selection of open-source software. Integration of the best-worst method (BWM) and VIKOR MCDM techniques have been used for weighting and ranking OSS alternatives. …”
Get full text
Get full text
Thesis -
13
Optimizing skyline query processing in incomplete data
Published 2019“…Skyline queries are used to identify superior data items in the database. Most of the previously proposed skyline algorithms work on a complete database where the data are always present (non-missing). …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
14
Segment particle swarm optimization adoption for large-scale kinetic parameter identification of escherichia coli metabolic network model
Published 2018“…The seven sensitive kinetic parameters were used in both the algorithms to minimize the model response errors. The validation results proved the effectiveness of both the proposed methods, which identified the kinetics and minimized the model response errors perfectly.…”
Get full text
Get full text
Get full text
Article -
15
Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks / Wang Jie ... [et al.]
Published 2024“…Simulated data are generated using ANSYS software by using models of semi-circular defects in steel pipes, producing magnetic leakage signals of varying intensities. …”
Get full text
Get full text
Article -
16
Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks
Published 2024“…Simulated data are generated using ANSYS software by using models of semi-circular defects in steel pipes, producing magnetic leakage signals of varying intensities. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Edge assisted crime prediction and evaluation framework for machine learning algorithms
Published 2022“…To anticipate occurrences, ML methods such as Decision Trees, Neural Networks, K-Nearest Neighbors, and Impact Learning are being utilized, and their performance is compared based on the data processing and modification used. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Improving Patient Rehabilitation Performance In Exercise Games Using Collaborative Filtering Approach
Published 2024journal::journal article -
19
Brewing perfection: real-time monitoring of arabic coffee using iot and machine learning
Published 2026“…The system demonstrated high efficiency and accuracy in performance, mimicking human coffee brewing methods. The results demonstrate the potential of the YOLOv8 algorithm to automate and optimize routine tasks with high accuracy.…”
Get full text
Get full text
Get full text
Proceeding Paper -
20
An enhanced motion planning method for industrial robots based on the digital twin concept
Published 2025“…By integrating an improved Artificial potential field method, A* algorithm, and a synergistic approach combining 3-5-3 polynomial interpolation with particle swarm optimization, we effectively address the challenges of dynamic obstacle avoidance and trajectory optimization. …”
Get full text
Get full text
Thesis
