Search Results - (( java application modified algorithm ) OR ( square extraction method algorithm ))

Refine Results
  1. 1

    A comparative study of evolutionary algorithms and adapting control parameters for estimating the parameters of a single-diode photovoltaic module's model by Muhsen D.H., Ghazali A.B., Khatib T., Abed I.A.

    Published 2023
    “…Algorithms; Diodes; Errors; Iterative methods; Least squares approximations; Mean square error; Optimization; Parameter estimation; Parameter extraction; Photovoltaic cells; Coefficient of determination; Differential Evolution; Electromagnetism-like algorithm; Hybrid evolutionary algorithm; Photovoltaic; Photovoltaic modules; Root mean square errors; Single-diode models; Evolutionary algorithms; algorithm; comparative study; electromagnetic method; estimation method; experimental design; numerical method; parameterization; performance assessment; photovoltaic system…”
    Article
  2. 2

    Parameters extraction of double diode photovoltaic module's model based on hybrid evolutionary algorithm by Muhsen D.H., Ghazali A.B., Khatib T., Abed I.A.

    Published 2023
    “…Algorithms; Diodes; Errors; Extraction; Iterative methods; Mean square error; Optimization; Parameter estimation; Parameter extraction; Photovoltaic cells; Differential evolution algorithms; Diode modeling; Electromagnetism-like algorithm; Fast convergence speed; Hybrid evolutionary algorithm; IV characteristics; Photovoltaic model; Root mean square errors; Evolutionary algorithms…”
    Article
  3. 3
  4. 4

    Efficient Big Integer Multiplication and Squaring Algorithms for Cryptographic Applications by Jahani, Shahram, Samsudin, Azman, Subramanian, Kumbakonam Govindarajan

    Published 2014
    “…Compared to the adopted classical and Karatsuba multiplication algorithms for squaring, the proposed squaring algorithm is 2 to 3.7 and 7.9 to 2.5 times faster for squaring 32-bit and 8-Kbit numbers, respectively. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    Single-trial visual evoked potential extraction using partial least-squares-based approach by Yanti, D.K., Yusoff, M.Z., Asirvadam, V.S.

    Published 2016
    “…A single-trial extraction of a visual evoked potential (VEP) signal based on the partial least-squares (PLS) regression method has been proposed in this paper. …”
    Get full text
    Get full text
    Article
  8. 8

    Single-trial visual evoked potential extraction using partial least-squares-based approach by Yanti, D.K., Yusoff, M.Z., Asirvadam, V.S.

    Published 2016
    “…A single-trial extraction of a visual evoked potential (VEP) signal based on the partial least-squares (PLS) regression method has been proposed in this paper. …”
    Get full text
    Get full text
    Article
  9. 9

    Utilizing artificial bee colony algorithm as feature selection method in Arabic text classification by Hijazi, Musab, Zeki, Akram M., Ismail, Amelia Ritahani

    Published 2023
    “…In this paper, the filter method chi square and the Artificial Bee Colony) ABC algorithm were both used as FS methods . …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Performance of Levenberg-Marquardt neural network algorithm in power quality disturbances classification / Adibah I’zzah Mohamad Kasim by Mohamad Kasim, Adibah I’zzah

    Published 2025
    “…Results demonstrated that the LM algorithm outperformed Bayesian Regularization (BR) and Scaled Conjugate Gradient (SCG) methods in terms of accuracy, convergence speed, and computational efficiency, achieving near-perfect regression values and minimal mean square error for most PQD types. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Non-fiducial based electrocardiogram biometrics with kernel methods by Hejazi, Maryamsadat

    Published 2017
    “…The effectiveness of this algorithm is investigated by comparing with other AC based feature extraction algorithms involving AC/LDA (Linear Discriminant Analysis) and AC/PCA (Principal Component Analysis). …”
    Get full text
    Get full text
    Thesis
  13. 13

    Fingerprint classification : a BI-resolution approach to singular point extraction by Leong, Chung Ern

    Published 2004
    “…This thesis presents a singular point extraction method using two layers of information, without pre-processing of the image. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Developing and validating a simulation model for counting and classification of vehicles by Ali Emad Jehad, Riza Atiq O.K. Rahmat

    Published 2016
    “…An algorithm system approach has been presented for extracting traffic data using video image processing. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Disposable Biomimetic Array Sensor Strip Coupled With Chemometric Algorithm For Quality Assessment Of Orthosiphon Stamineus Benth Samples by Yap, Maxsim Mee Sim

    Published 2006
    “…For quantitative analysis, Partial Least Square (PLS) and Principal Component Regression (PCR) were applied to the array sensor output to determine whether the content of sinensetin and caffeic acid in different batches of O.stamineus extracts could be obtained by these methods. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Pattern Recognition for Human Diseases Classification in Spectral Analysis by Nur Hasshima Hasbi, Abdullah Bade, Fuei, Pien Chee, Muhammad Izzuddin Rumaling

    Published 2022
    “…On the other hand, classification methods are techniques or algorithms used to group samples into a predetermined category. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20