Search Results - (( java implication based algorithm ) OR ( parameter validation matching algorithm ))
Search alternatives:
- parameter validation »
- validation matching »
- implication based »
- java implication »
-
1
-
2
Hybrid Artificial Bees Colony Algorithms For Optimizing Carbon Nanotubes Characteristics
Published 2018“…Optimization is a crucial process to select the best parameters in single and multi-objective problems for manufacturing process.However,it is difficult to find an optimization algorithm that obtain the global optimum for every optimization problem.Artificial Bees Colony (ABC) is a well-known swarm intelligence algorithm in solving optimization problems.It has noticeably shown better performance compared to the state-of-art algorithms.This study proposes a novel hybrid ABC algorithm with β-Hill Climbing (βHC) technique (ABC-βHC) in order to enhance the exploitation and exploration process of the ABC in optimizing carbon nanotubes (CNTs) characteristics.CNTs are widely used in electronic and mechanical products due to its fascinating material with extraordinary mechanical,thermal,physical and electrical properties. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Efficiency improvement of a standalone photovoltaic system using fuzzy-based maximum power point tracking algorithm
Published 2016“…The MPPT algorithms imply the optimal duty ratio to drive the matching converter for optimal maximum power tracking. …”
Get full text
Get full text
Thesis -
4
-
5
A fuzzy-rule-based PV inverter controller to enhance the quality of solar power supply: Experimental test and validation
Published 2023“…It is seen that the experimental results of the switching signals, inverter voltage and current, control parameters, and total harmonic distortion (THD) of load current and output voltage of the PV inverter are closely matched with that of the simulation results. …”
Article -
6
Optimizing n-1 contingency rankings using a nature-inspired modified sine cosine algorithm
Published 2025“…The MSCA method is validated using the IEEE 30-bus test case, focusing on optimal parameter tuning for population size, iterations, and key variables. …”
Get full text
Get full text
Get full text
Article -
7
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
8
Evaluating and predicting overall equipment effectiveness for deep water disposal pump using ANNGA analysis approach / Soud Al-Toubi, Babakalli Alkali, David Harrison and Sudhir C....
Published 2023“…This study proposes the Artificial Neural Network with a Genetic Algorithm analysis approach to investigate the Overall Equipment Effectiveness of the deep-water disposal pump system. …”
Get full text
Get full text
Get full text
Article -
9
Utilizing Artificial Neural Network for Prediction of Occupants Thermal Comfort: A Case Study of a Test Room Fitted with a Thermoelectric Air-Conditioning System
Published 2020“…After that, the ANN model was developed based on the Levenberg-Marquardt algorithm by taking experimental parameters such as air temperature, relative humidity, globe temperature, wind speed, metabolic rate, and clothing value as model input. …”
Get full text
Get full text
Article -
10
Indirect Rotor Field Oriented Control of Induction Motor With Rotor Time Constant Estimation
Published 2004“…Since the position of the rotor flux vector is estimated in an IRFOC scheme, and is dependent on the motor model (more specifically the rotor parameters), these parameters must be obtained accurately and match the motor parameters at all times. …”
Get full text
Get full text
Thesis -
11
Nonlinear vibration based modeling for damage detection of reinforced concrete beams / Muhammad Usman Hanif
Published 2018“…Based on the finite element model, a 3-parameters relation was proposed. The parameters of damage, nonlinearity coefficient and exciting force can be used to detect unknown damage from the known values of the excitation force and the nonlinearity coefficients from the actual structure. …”
Get full text
Get full text
Get full text
Thesis -
12
Modeling And Optimization Of Lipase-Catalyzed Synthesis Of Adipate Esters Using Response Surface Methodology And Artificial Neural Network
Published 2010“…Various feedforward neural networks were performed using different learning algorithms. The best algorithm was found to be Levenberg–Marquardt (LM) for a network composed of seven hidden nodes with hyperbolic tangent sigmoid transfer function. …”
Get full text
Get full text
Thesis -
13
Passive Client-Centric Rogue Access Point Detection Framework For WiFi Hotspots
Published 2018“…The proliferation of Wi-Fi hotspots in public places provides seamless Internet connectivity anywhere at any time to the wireless clients.Although many hotspots are often unprotected,unmanaged and unencrypted,this does not prevent the clients from actively connecting to the network.The underlying problem is that the network Access Point (AP) is always trusted.The adversary can impersonate a legitimate AP by setting up a rogue AP to commit espionage and to launch evil-twin attack,session hijacking,and eavesdropping.To aggravate the threats, existing detection solutions are ill-equipped to safeguard the client against rogue AP.Infrastructure- centric solutions are heavily relied on the deployment of sensors or centralized server for rogue AP detection, which are limited,expensive and rarely to be implemented in hotspots.Even though client-centric solutions offer threat-aware protection for the client,but the dependency of the existing solutions on the spoofable contextual network information and the necessity to be associated with the network makes those solutions are not viable for the hotspot’s client.Hence,this work proposes a framework of passive client-centric rogue AP detection for hotspots.Unlike existing solutions,the key idea is to piggyback AP-specific and network-specific information in IEEE 802.11 beacon frame that enables the client to perform the detection without authentication and association to any AP.Based on the spatial fingerprints included in the broadcasted information from the APs in the vicinity of the client,this work discloses a novel concept that enables the rogue AP detection via the client’s ability to self-colocalize and self-validate its own position in the hotspot.The legitimacy of the APs in the hotspot,in this view,lies in the fact that the correct matching between the Received Signal Strength Indicator (RSSI) measurements at the client and pre-recorded fingerprints is attainable when the beacons are transmitted only from the legitimate APs.Hence,any anomalousness in AP’s beacon frame or any attempt to replay the legitimate AP’s beacon frame from different location can be detected and classified as rogue AP threats.Through experiments in real environment,the results demonstrate that with proper algorithm selection and parameters tuning,the rogue AP detection framework can achieve over 90% detection accuracy in classifying the absence and presence of rogue AP threats in the hotspot.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Simulation and characterization of indium gallium arsenide thermophotovoltaic cell for harvesting waste heat with different spectral irradiances
Published 2023“…The simulation results were validated with the reported experimental results. …”
text::Thesis -
15
Machine learning-based reflection coefficient and impedance prediction for a meandered slot patch antenna
Published 2025“…A dataset of 500 samples, including resonance frequency and S11 values, is generated, and an equivalent RLC circuit is modeled to calculate inductance and capacitance. The random forest algorithm is applied, achieving a maximum prediction error of 12.46 % for S11 and stable R2 accuracy of 0.98 validated through 10-fold cross-validation. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Development Of Distributed Grid-Based Hydrological Model And Floodplain Inundation Management System
Published 2008“…Hourly data for flow were created into compatible MIKE11 time series in a separate file as input to the parameter editors. Initial and boundary conditions were based on the inputs for MIKE11 operational analysis. …”
Get full text
Get full text
Thesis
