Search Results - (( peer optimization method algorithm ) OR ( basic validation using algorithm ))
Search alternatives:
- peer optimization »
- method algorithm »
- basic validation »
- validation using »
- using algorithm »
-
1
Optimal power flow based on fuzzy linear programming and modified Jaya algorithms
Published 2017“…Two versions of the Jaya algorithm namely, the basic Jaya algorithm and novel quasi-oppositional Jaya (QOJaya) algorithm are proposed to solve different single objective OPF problems. …”
Get full text
Get full text
Thesis -
2
System identification using Extended Kalman Filter
Published 2017“…In order to evaluate the performance of the EKF learning algorithm, the proposed algorithm validation were analyzed using model validation methods as a checker such as One Step Ahead (OSA) and correlation coefficient (R2). …”
Get full text
Get full text
Student Project -
3
Backtracking search algorithm for optimal power dispatch in power system / Mostafa Modiri Delshad
Published 2016“…Backtracking search algorithm (BSA) as the new evolutionary technique of optimization is used for solving the problems. …”
Get full text
Get full text
Thesis -
4
Parametric modelling of a TRMS using dynamic spread factor particle swarm optimisation
Published 2009“…Thus, the usage of dynamic SF is proved experimentally to satisfy main issues of using basic PSO that are trapped in local optima and preservation of diversity. …”
Get full text
Get full text
Get full text
Proceeding Paper -
5
Power System State Estimation In Large-Scale Networks
Published 2010“…Hence. SE requires to use various techniques to ensure validity of the results and to detect and identify sources of errors. …”
Get full text
Get full text
Thesis -
6
An enhanced minimum variance distortionless response beamformer techniques to reduce interference in array antenna system
Published 2017“…Metaheuristic optimization algorithms are used widely to solve many engineering problems. …”
Get full text
Get full text
Thesis -
7
Fractal coding of bio-metric image for face authentication
Published 2021“…The thesis also compares the results of enough images of various sizes generated by the proposed algorithms with the results of other fractal coding methods to confirm the algorithms’ clarity, reliability and validity. …”
Get full text
Get full text
Thesis -
8
Landslide susceptibility mapping at VAZ watershed (Iran) using an artificial neural network model: a comparison between multilayer perceptron (MLP) and radial basic function (RBF)...
Published 2013“…Finally the landslide susceptibility maps were validated using the validation data (i.e., 30 % landslide location data that was not used during the model construction) using area under the curve (AUC) method. …”
Get full text
Get full text
Article -
9
Application of genetic algorithm methods to optimize flowshop sequencing problem
Published 2008Get full text
Get full text
Undergraduates Project Papers -
10
-
11
-
12
-
13
-
14
An experimental validation and optimisation tool path strategy for thin walled structure
Published 2011“…The target was to develop models which mimic the actual cutting process using the finite element method (FEM), to validate the developed tool path strategy algorithm with the actual machining process and to programme the developed algorithm into the software. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Wind farm reactive power optimization by using imperialist competitive algorithm
Published 2013Get full text
Get full text
Conference or Workshop Item -
17
-
18
-
19
-
20
Wind Farm Reactive Power Optimization by Using Imperialist Competitive Algorithm
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item
