Search Results - (( java implementation cell algorithm ) OR ( program identification method algorithm ))
Search alternatives:
- identification method »
- java implementation »
- implementation cell »
- method algorithm »
- cell algorithm »
-
1
Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus
Published 2003“…This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. …”
Get full text
Get full text
Thesis -
2
System identification using Extended Kalman Filter
Published 2017“…System identification is getting more intensive from researcher to develop an algorithm with work efficiently and more accurate. …”
Get full text
Get full text
Student Project -
3
Flow regime identification of particles conveying in pneumatic pipeline using electric charge tomography and neural network techniques
Published 2006“…This research has produced filtered back concentration profiles of each flow regimes owing to the technique of neural network method of flow regime identification.…”
Get full text
Get full text
Thesis -
4
Comparison of algorithm Support Vector Machine and C4.5 for identification of pests and diseases in chili plants
Published 2019“…Information about chili pests is collected so that it becomes a database that can be used to identify disease pests using the data mining method. The use of data mining algorithms is expected to help in the identification of pests and diseases in chili plants. …”
Get full text
Get full text
Conference or Workshop Item -
5
Simultaneous Network Reconfiguration and DG Sizing Using Evolutionary Programming and Genetic Algorithm to Minimize Power Losses
Published 2014“…This paper presents an effective method based on Evolutionary Programming (EP) and Genetic Algorithm (GA) to identify the switching operation plan for feeder reconfiguration and distributed generation size simultaneously. …”
Get full text
Get full text
Get full text
Article -
6
-
7
Monotone Data Samples Do Not Always Produce Monotone Fuzzy If- Then Rules: Learning with Ad hoc and System Identification Methods
Published 2017“…Besides that, a constrained non-linear programming method for FIS modelling is suggested, as a variant of the system identification method.…”
Get full text
Get full text
Get full text
Article -
8
Fault location identification in power transmission networks: using novel nonintrusive fault-monitoring systems
Published 2021“…To examine and validate the proposed methodology, various fault types in a sample power system are simulated by using the electromagnetic transient program (EMTP). The simulation results reveal that the proposed methods demonstrate a high success rate of fault-location identification in power transmission networks for NIFM applications.…”
Get full text
Get full text
Get full text
Article -
9
-
10
Biometrics: Facial Recognition
Published 2004“…It also lists the various approaches in handling facial recognition where we see different methods applied and opinions on which method is better and what factors influenced them. …”
Get full text
Get full text
Final Year Project -
11
A Framework for Green Energy Resources Identification and Integration Supported by Real-Time Monitoring, Control, and Automation Applications
Published 2025“…Validation against conventional methods and state-of-the-art algorithms confirmed the superior performance of the proposed approach. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
-
13
Fault location identification in power transmission networks using novel non-intrusive fault monitoring systems
Published 2020“…To examine and validate the proposed methodology for constructing power transmission networks, various fault types are simulated by using electromagnetic transients program (EMTP). The simulation results are achieved to reveal that the proposed methods demonstrate a high success rate of fault location identification in power transmission networks for NIFM applications.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
A hybrid ANN for output power prediction and online monitoring in grid-connected photovoltaic system / Puteri Nor Ashikin Megat Yunus
Published 2023“…After that, a hybrid of MLFNN with other optimization methods was introduced, i.e. Improved Fast Evolutionary Programming (IFEP), Evolutionary Programming- Dolphin Echolocation Algorithm (EPDEA) and Evolutionary Programming-Firefly Algorithm (EPFA). …”
Get full text
Get full text
Thesis -
15
Detecting cholesterol presence using iris recognition algorithm
Published 2010Get full text
Working Paper -
16
Development of thumbprint recognition system using Matlab / Wan Hasnizam Wan Hassan
“…Biometric is a technology, which identifies a person based on his physiology or behavioral characteristics. Thumbprint identification and recognition is one of the biometrics method available that has been widely used in various applications because of it is reliability and accuracy in the process of recognizing and verifying a person identity. …”
Get full text
Get full text
Student Project -
17
A single measurement of combined Direct and indirect MPPT algorithm for mismatch PV module application / Mohd Najib Mohd Hussain
Published 2016“…A novel of combination direct and indirect (CoDId) MPPT algorithm is implemented for solving mismatch losses from existing PV system by employing the implementation of system identification approach. …”
Get full text
Get full text
Thesis -
18
Machine Learning in Sports: Identifying Potential Archers
Published 2019“…This book is valuable for coaches and managers in identifying potential archers during talent identification programs.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Book -
19
Application of Eigenvector and Eigenvalue for face recognition / Redhayuden Aidil Abdul Razak
Published 2020“…Face Recognition have various applications including Security Systems, Augmented reality, Real time identification and many more. Over the past few decades there have been numerous works done in this field and many methods and algorithms have been proposed. …”
Get full text
Get full text
Student Project -
20
