Search Results - (( data optimization method algorithm ) OR ( software validation using algorithm ))

Refine Results
  1. 1

    Autoreclosure in Extra High Voltage Lines using Taguchi’s Method and Optimized Neural Networks by Desta, Zahlay F., K.S., Ramarao, Taj, Mohammed Baloch

    Published 2008
    “…The algorithms are developed using MATLABTM software. A range of faults are simulated on EHV modeled transmission line using SimPowerSytemsTM, and the spectra of the fault data are analyzed using fast Fourier transform which facilitates extraction of distinct features of each type of fault. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Autoreclosure in Extra High Voltage Lines using Taguchi's Method and Optimized Neural Networks by Desta, Zahlay F., K.S., Rama Rao

    Published 2009
    “…The algorithms are developed using MATLAB software. A range of faults are simulated on EHV modeled transmission line using SimPowerSytems, and the spectra of the fault data are analyzed using fast Fourier transform to extract features of each type of fault. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Autoreclosure in extra high voltage lines using taguchi's method and optimized neural networks by K.S.R, Rao, F. D., Zahlay

    Published 2008
    “…The algorithms are developed using MATLABâ„¢ software. A range of faults are simulated on EHV modeled transmission line using SimPowerSytemsâ„¢, and the spectra of the fault data are analyzed using fast Fourier transform which facilitates extraction of distinct features of each type of fault. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Graph theory approach for managing lecturers’ schedule using graph colouring method / Siti Nor Ba Basri, Nur Su’aidah Khozaid and Farhana Hazwani Ismail by Basri, Siti Nor Ba, Khozaid, Nur Su’aidah, Ismail, Farhana Hazwani

    Published 2023
    “…By using graph theory, graph colouring techniques, and ILP validation, this work optimizes lecturers' timetable scheduling, resolving conflicts, omissions, limitations, and preferences for optimal educational scheduling and resource allocation. …”
    Get full text
    Get full text
    Student Project
  5. 5

    Mathematical models and optimization algorithms for low-carbon Location-Inventory-Routing Problem with uncertainty by Liu, Lihua

    Published 2024
    “…When compared to the Supply Chain Guru X (SCGX) software, the proposed algorithms offer higher practical applicability.…”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Variable Neighborhood Descent and Whale Optimization Algorithm for Examination Timetabling Problems at Universiti Malaysia Sarawak by Emily Sing Kiang, Siew

    Published 2025
    “…A constructive algorithm was developed to generate an initial feasible solution, which was subsequently refined using two primary approaches to evaluate their efficiency: Iterative Threshold Pipe Variable Neighborhood Descent (IT-PVND), and a modified Whale Optimization Algorithm (WOA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed by Borujeni, Sattar Chavoshi

    Published 2012
    “…This approach was based on fuzzy expert system (FES) using Fuzzy Toolbox of MATLAB software. Genetic algorithm (GA) was employed to adjust parameters of FES and optimize the system. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Multifunctional optimized group method data handling for software effort estimation by Arbain, Siti Hajar

    Published 2022
    “…Nevertheless, finding the best effort estimation model with good accuracy is hard to serve this purpose. Group Method of Data Handling (GMDH) algorithms have been widely used for modelling and identifying complex systems and potentially applied in software effort estimation. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower by Gatea, Sarah Jabbar

    Published 2018
    “…Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Controller placement problem in the optimization of 5G based SDN and NFV architecture by Ibrahim, Abeer Abdalla Zakaria

    Published 2021
    “…If the control plane fails to improve system resilience quality, A reliable RAMCP is formulated as an optimal solution for fault tolerance. Furthermore, the approach is extended with a Particle Swarm Algorithm (PSO) and presented as a hybrid RASCP to validate the optimal location and number of controllers. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Feature fusion using a modified genetic algorithm for face and signature recognition system by Suryanti, Awang

    Published 2015
    “…Results show that the proposed method yield optimal recognition with the highest accuracy of 97.50%. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Multi-perspective usability evaluation with multi-criteria decision analysis for optimal selection of open-source software by Dawood, Kareem Abbas

    Published 2021
    “…Hence, this research proposes a methodology for multi-perspective usability evaluation with multi-criteria decision analysis for optimal selection of open-source software. Integration of the best-worst method (BWM) and VIKOR MCDM techniques have been used for weighting and ranking OSS alternatives. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Optimizing skyline query processing in incomplete data by Gulzar, Yonis, Alwan, Ali Amer, Turaev, Sherzod

    Published 2019
    “…Skyline queries are used to identify superior data items in the database. Most of the previously proposed skyline algorithms work on a complete database where the data are always present (non-missing). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Segment particle swarm optimization adoption for large-scale kinetic parameter identification of escherichia coli metabolic network model by Azrag, Mohammed Adam Kunna, Tuty Asmawaty, Abdul Kadir, Jaber, Aqeel S.

    Published 2018
    “…The seven sensitive kinetic parameters were used in both the algorithms to minimize the model response errors. The validation results proved the effectiveness of both the proposed methods, which identified the kinetics and minimized the model response errors perfectly.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks / Wang Jie ... [et al.] by Wang, Jie, Mohd. Shah, Mohd. Kamal, Choong, Wai Heng, Al-Azad, Nahiyan

    Published 2024
    “…Simulated data are generated using ANSYS software by using models of semi-circular defects in steel pipes, producing magnetic leakage signals of varying intensities. …”
    Get full text
    Get full text
    Article
  16. 16

    Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks by Wang Jie, Mohd. Kamal Mohd. Shah, Choong Wai Heng, Nahiyan Al-Azad

    Published 2024
    “…Simulated data are generated using ANSYS software by using models of semi-circular defects in steel pipes, producing magnetic leakage signals of varying intensities. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Edge assisted crime prediction and evaluation framework for machine learning algorithms by Adhikary, Apurba, Murad, Saydul Akbar, Munir, Md Shirajum, Choong Seon, Hong Seong

    Published 2022
    “…To anticipate occurrences, ML methods such as Decision Trees, Neural Networks, K-Nearest Neighbors, and Impact Learning are being utilized, and their performance is compared based on the data processing and modification used. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Brewing perfection: real-time monitoring of arabic coffee using iot and machine learning by Abuzaraida, Mustafa Ali, A. L. gaud, Sarah, Abrahim Hneish, Hamza, Attarbashi, Zainab

    Published 2026
    “…The system demonstrated high efficiency and accuracy in performance, mimicking human coffee brewing methods. The results demonstrate the potential of the YOLOv8 algorithm to automate and optimize routine tasks with high accuracy.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    An enhanced motion planning method for industrial robots based on the digital twin concept by Rui, Fan

    Published 2025
    “…By integrating an improved Artificial potential field method, A* algorithm, and a synergistic approach combining 3-5-3 polynomial interpolation with particle swarm optimization, we effectively address the challenges of dynamic obstacle avoidance and trajectory optimization. …”
    Get full text
    Get full text
    Thesis