Search Results - (( parameter evaluation method algorithm ) OR ( basic detection method algorithm ))
Search alternatives:
- parameter evaluation »
- evaluation method »
- method algorithm »
- basic detection »
-
1
Power System State Estimation In Large-Scale Networks
Published 2010“…The gain and the Jacobian matrices associated with the basic algorithm require large storage and have to be evaluated at every iteration, resulting in more computation time. …”
Get full text
Get full text
Thesis -
2
Numerical Analysis of structural batteries response with the presence of uncertainty
Published 2023“…The proposed research is devoted to the uncertainty analysis of structural battery behavior under various parameters. To help with the analysis, a dedicated algorithm based on an elimination approach to solve numerical problems with uncertain parameters is successfully developed using Visual Basic. …”
Get full text
Get full text
Get full text
Article -
3
Numerical Analysis of Structural Batteries Response with the Presence of Uncertainty
Published 2023“…The proposed research is devoted to the uncertainty analysis of structural battery behavior under various parameters. To help with the analysis, a dedicated algorithm based on an elimination approach to solve numerical problems with uncertain parameters is successfully developed using Visual Basic. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Image Splicing Detection With Constrained Convolutional Neural Network
Published 2019“…It is shown that CNN with constrained convolution algorithm can be used as a general image splicing detection task.…”
Get full text
Get full text
Thesis -
5
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…These results indi�cate that the proposed method can improve the RAN learning algorithm towards the large-scale stream data processing. …”
Get full text
Get full text
Thesis -
6
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019“…As network attackers keep changing their methods of attack execution to evade the deployed intrusion-detection systems (IDS), machine learning (ML) algorithms have been introduced to boost the performance of the IDS. …”
Get full text
Get full text
Conference or Workshop Item -
7
Cars detection in stitched image using morphological approach
Published 2017“…The performance of the proposed cars detection algorithm could detect the cars fairly accurate. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
8
The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model
Published 2017“…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. …”
Get full text
Get full text
Get full text
Article -
9
An ensemble feature selection method to detect web spam
Published 2018“…An ensemble feature selection method has been proposed in this paper to detect web spam. …”
Get full text
Get full text
Get full text
Article -
10
Parameter extraction of photovoltaic module using hybrid evolutionary algorithm
Published 2023Conference Paper -
11
Taguchi-Grey Relational Analysis Method for Parameter Tuning of Multi-objective Pareto Ant Colony System Algorithm
Published 2023“…The gray relational grade (GRG) performance metric and the Friedman test were used to evaluate the algorithm’s performance. The Taguchi-GRA method that produced the new values for the algorithm’s parameters was shown to be able to provide a better multi-objective generator maintenance scheduling (GMS) solution. …”
Get full text
Get full text
Get full text
Article -
12
Evaluation of lightning current parameters using measured lightning induced voltage on distribution power lines
Published 2019“…In this paper, an algorithm had been proposed to evaluate the lightning current parameters using measured voltage from overhead distribution lines based on lightning location obtained from lightning location system. …”
Get full text
Get full text
Conference or Workshop Item -
13
Inversed Control Parameter in Whale Optimization Algorithm and Grey Wolf Optimizer for Wrapper-Based Feature Selection: A Comparative Study
Published 2023“…This comparative study aims to investigate and compare the effectiveness of the inversed control parameter in the proposed methods against the original algorithms in terms of the number of selected features and the classification accuracy. …”
Get full text
Get full text
Article -
14
Inversed Control Parameter in Whale Optimization Algorithm and Grey Wolf Optimizer for Wrapper-Based Feature Selection: A Comparative Study
Published 2023“…This comparative study aims to investigate and compare the effectiveness of the inversed control parameter in the proposed methods against the original algorithms in terms of the number of selected features and the classification accuracy. …”
Get full text
Get full text
Article -
15
Enhanced algorithms for three-dimensional object interpreter
Published 2004“…The linear system is solved using bisection method of total least square approximation. Besides reducing the number of image regularities used and new method to solve the linear system, this study has proposed better solutions in terms of an enhanced thinning algorithm, a modified Freeman chain code algorithm as picture description language, and a new computational comer detection algorithm.…”
Get full text
Get full text
Get full text
Thesis -
16
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
17
Evaluation of Lightning Current Using Inverse Procedure Algorithm.
Published 2013“…The proposed method considers on all electromagnetic fields components and can evaluate full shape of current, velocity and constant parameters of current models in contrast with previous studies. …”
Get full text
Get full text
Article -
18
-
19
Web Camera Application For Motion Detection
Published 2003“…The new method to detect motion is "vision motion detection". …”
Get full text
Get full text
Thesis -
20
Tree-based contrast subspace mining method
Published 2020“…Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
Get full text
Get full text
Get full text
Thesis
