Search Results - (( java implementation amh algorithm ) OR ( program identification using algorithm ))
Search alternatives:
- identification using »
- java implementation »
- implementation amh »
- using algorithm »
- amh algorithm »
-
1
Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus
Published 2003“…This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. …”
Get full text
Get full text
Thesis -
2
-
3
-
4
Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat
Published 2008“…Consequently, another algorithm for maximum loadability identification using EP optimization technique was also developed. …”
Get full text
Get full text
Thesis -
5
System identification using Extended Kalman Filter
Published 2017“…All the coding simulation and the results analyzed was done using Matlab programming software.…”
Get full text
Get full text
Student Project -
6
Flow regime identification of particles conveying in pneumatic pipeline using electric charge tomography and neural network techniques
Published 2006“…A high speed data acquisition card DAS1800HC is used to interface the sensors to a personal computer which processes the data using linear back projection algorithm (LBPA) and filtered back projection algorithm (FBPA). …”
Get full text
Get full text
Thesis -
7
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
Get full text
Get full text
Thesis -
8
Comparison of algorithm Support Vector Machine and C4.5 for identification of pests and diseases in chili plants
Published 2019“…The use of data mining algorithms is expected to help in the identification of pests and diseases in chili plants. …”
Get full text
Get full text
Conference or Workshop Item -
9
Hazard identification on fractionation column using rule based expert system
Published 2001“…The study has contributed to an improvement of hazard identification technique and proposed an algorithm by considering the whole consequences of process deviation in each stream. …”
Get full text
Get full text
Article -
10
-
11
-
12
Study Of Modified Training Algorithm For Optimized Convergence Speed Of Neural Network
Published 2016“…First proposed algorithm is the combination of momentum algorithm with adaptive learning rate (ALR) algorithm, and second proposed algorithm is the combination of momentum algorithm with automatic learning rate selection (ALRS) algorithm. …”
Get full text
Get full text
Thesis -
13
-
14
Fault location identification in power transmission networks: using novel nonintrusive fault-monitoring systems
Published 2021“…To examine and validate the proposed methodology, various fault types in a sample power system are simulated by using the electromagnetic transient program (EMTP). …”
Get full text
Get full text
Get full text
Article -
15
Monotone Data Samples Do Not Always Produce Monotone Fuzzy If- Then Rules: Learning with Ad hoc and System Identification Methods
Published 2017“…Our analysis shows that even with multi-attribute monotone data, non-monotone fuzzy If- Then rules can be produced using an ad hoc method. The same observation can be made, empirically, using a system identification method, e.g., a derivative–based optimization method and the genetic algorithm. …”
Get full text
Get full text
Get full text
Article -
16
Radio Frequency Identification (RFID) Indoor Parking Control System
Published 2017“…Based on the data, the dynamic programming algorithm embedded in the system will determine the nearest parking location based on their entrance destination to the worker. …”
Get full text
Get full text
Article -
17
-
18
Fpga-Based Accelerator For The Identification Of Finger Vein Pattern Via K-Nearest Centroid Neighbors
Published 2016“…As almost all finger vein recognition algorithms were implemented using software such as MATLAB which is based on general-purpose processor, the processing speed become the bottleneck of the development of finger vein recognition. …”
Get full text
Get full text
Thesis -
19
Fault location identification in power transmission networks using novel non-intrusive fault monitoring systems
Published 2020“…To examine and validate the proposed methodology for constructing power transmission networks, various fault types are simulated by using electromagnetic transients program (EMTP). …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
Development of thumbprint recognition system using Matlab / Wan Hasnizam Wan Hassan
“…The algorithm used in order to achieve the result is called feedforward backpropagation neural network.…”
Get full text
Get full text
Student Project
