Search Results - (( intelligence based coding algorithm ) OR ( intelligence study based algorithm ))
Search alternatives:
- intelligence based »
- intelligence study »
- coding algorithm »
- based coding »
-
1
An Intelligent Voltage Controller for a PV Inverter System Using Simulated Annealing Algorithm-Based PI Tuning Approach
Published 2017“…This study associates an intelligent voltage controller based PI approach for PV electrical inverter by employing a meta-heuristic optimization algorithmic called a Simulated Annealing (SA) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Intelligent energy systems using the barnacles mating optimizer and evolutionary mating algorithm: Foundations, methods, and applications
Published 2026“…Intelligent Energy Systems using the Barnacles Mating Optimizer and Evolutionary Mating Algorithm: Foundations, Methods, and Applications reveals the potential of innovative optimization algorithms to support sustainability in modern energy systems. …”
Get full text
Get full text
Get full text
Book -
3
-
4
Hybrid Intelligent Warning System for Boiler tube Leak Trips
Published 2017“…The first intelligent warning system (IWS-1) represents the use of pure artificial neural network system whereas the second intelligent warning system (IWS-2) represents merging of genetic algorithms and artificial neural networks as a hybrid intelligent system. …”
Get full text
Get full text
Article -
5
The application of suitable sports games for junior high school students based on deep learning and artificial intelligence
Published 2025“…This study intends to develop a Spatial Temporal-Graph Convolutional Network (ST-GCN) action detection algorithm based on the MediaPipe framework. …”
Get full text
Get full text
Get full text
Article -
6
Detection of head position using chain code algorithm
Published 2007“…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
Get full text
Get full text
Thesis -
7
Detection of head position using chain code algorithm
Published 2007“…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
Get full text
Get full text
Thesis -
8
An intelligent voltage controller for a PV inverter system using simulated annealing algorithm-based PI tuning approach
Published 2023“…This study associates an intelligent voltage controller based PI approach for PV electrical inverter by employing a meta-heuristic optimization algorithmic called a Simulated Annealing (SA) algorithm. …”
Article -
9
Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman
Published 2019“…This study is divided into several phases including preliminary study, experimental design, algorithm enhancement and result analysis. …”
Get full text
Get full text
Thesis -
10
-
11
-
12
Model-Based Design (MBD) for autonomous underwater vehicle
Published 2019Get full text
Get full text
Get full text
Article -
13
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…It provides a systematic overview of major post-quantum cryptographic families, including lattice-based, hash-based, code-based, multivariate, and isogeny-related schemes, and evaluates their current security assumptions, practical efficiency, and readiness for real-world deployment. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Machine learning-based enhanced deep packet inspection for IP packet priority classification with differentiated services code point for advance network management
Published 2024“…In modern networking, the efficient prioritization and classification of network traffic is paramount to ensure optimal network performance and optimization. This study presents an approach to enhance intelligent packet forwarding priority classification on Differentiated Services Code Point (DSCP), leveraging classifiers from machine learning algorithms for Deep Packet Inspection (DPI). …”
Get full text
Get full text
Get full text
Get full text
Article -
15
AI recommendation penetration testing tool for SQL injection: linear regression
Published 2025“…The important of this study lies in its response to the labor and time-consuming nature of current testing methods. …”
Get full text
Get full text
Get full text
Article -
16
Development Of Generative Computer-Aided Process Planning For Cnc Milling Parts_Pramodkumar S Kataraki
Published 2019“…The validation of developed algorithm by percentage error (%) shows error less than 0.1% and the machine selection criteria suggests user the type of milling machine needed to manufacture a part based on level of complexity.…”
Get full text
Get full text
Thesis -
17
Optimization And Execution Of Multiple Holes-Drilling Operations Based On STEP-NC
Published 2021“…The newly developed system combines between open CNC control system and ant colony optimization (ACO) algorithm by using LabVIEW software. A developed system is based on STEP-NC interpretation, optimization, 3D simulation, and automatic document generation modules that have been used to verify and validate the system in extract and optimize STEP-NC drilling codes. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
A Harris hawks optimization based single- and multi objective optimal power flow considering environmental emission
Published 2020“…The obtained results are compared with the other Artificial Intelligence (AI) techniques such as the Whale Optimization Algorithm (WOA), the Salp Swarm Algorithm (SSA), Moth Flame (MF) and Glow Warm Optimization (GWO). …”
Get full text
Get full text
Get full text
Article -
19
Design of intelligent control system and its application on fabricated conveyor belt grain dryer
Published 2011“…Moreover, three evolutionary algorithms (EAs), in particular a real-coded genetic algorithm (GA), a particle swarm optimization (PSO), and a global-best harmony search (GHS), were separately used to train the proposed controller and to determine its scaling factors. …”
Get full text
Get full text
Thesis -
20
