Search Results - (( rate extraction method algorithm ) OR ( parameter extraction methods algorithm ))

Refine Results
  1. 1

    Parameter extraction of photovoltaic module using hybrid evolutionary algorithm by Muhsen D.H., Ghazali A.B., Khatib T.

    Published 2023
    “…Algorithms; Diodes; Extraction; Iterative methods; Optimization; Parameter estimation; Parameter extraction; Photovoltaic cells; Different evolutions; Differential Evolution; Diode modeling; Electromagnetism-like algorithm; Extracting parameter; Hybrid evolutionary algorithm; Photovoltaic model; Photovoltaic modules; Evolutionary algorithms…”
    Conference Paper
  2. 2

    A comparative study of evolutionary algorithms and adapting control parameters for estimating the parameters of a single-diode photovoltaic module's model by Muhsen D.H., Ghazali A.B., Khatib T., Abed I.A.

    Published 2023
    “…Algorithms; Diodes; Errors; Iterative methods; Least squares approximations; Mean square error; Optimization; Parameter estimation; Parameter extraction; Photovoltaic cells; Coefficient of determination; Differential Evolution; Electromagnetism-like algorithm; Hybrid evolutionary algorithm; Photovoltaic; Photovoltaic modules; Root mean square errors; Single-diode models; Evolutionary algorithms; algorithm; comparative study; electromagnetic method; estimation method; experimental design; numerical method; parameterization; performance assessment; photovoltaic system…”
    Article
  3. 3

    Parameters extraction of double diode photovoltaic module's model based on hybrid evolutionary algorithm by Muhsen D.H., Ghazali A.B., Khatib T., Abed I.A.

    Published 2023
    “…Algorithms; Diodes; Errors; Extraction; Iterative methods; Mean square error; Optimization; Parameter estimation; Parameter extraction; Photovoltaic cells; Differential evolution algorithms; Diode modeling; Electromagnetism-like algorithm; Fast convergence speed; Hybrid evolutionary algorithm; IV characteristics; Photovoltaic model; Root mean square errors; Evolutionary algorithms…”
    Article
  4. 4
  5. 5

    Plant leaf recognition algorithm using ant colony-based feature extraction technique by Ghasab, Mohammad Ali Jan

    Published 2013
    “…Therefore, it can be concluded that the proposed method is capable of a high rate of classification of various plant species.…”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Spatial network k-Nearest neighbor: A survey and future directives by Borhanuddin B., Solemon B.

    Published 2023
    “…However, among these techniques, which k- NN road network algorithm has the highest rate of query performance based on the selected parameters? …”
    Conference Paper
  8. 8

    Static image of hand gesture for numerical sign language recognition system using backfrofagation neural network / Erman Ibrahim by Ibrahim, Erman

    Published 2007
    “…Finally, the BP algorithm has been prove as a method that can be used for recognizing hand gesture for sign language and the successful task of recognition also dependent an the hnage processing. …”
    Get full text
    Thesis
  9. 9

    Towards enhanced remaining useful life prediction of lithium-ion batteries with uncertainty using optimized deep learning algorithm by Reza M.S., Hannan M.A., Mansor M., Ker P.J., Rahman S.A., Jang G., Mahlia T.M.I.

    Published 2025
    “…In addition, to validate the prediction performance of the proposed LSA + LSTM model, extensive comparisons are performed with other popular optimization-based deep learning methods including artificial bee colony (ABC) based LSTM (ABC + LSTM), gravitational search algorithm (GSA) based LSTM (GSA + LSTM), and particle swarm optimization (PSO) based LSTM (PSO + LSTM) model using different error matrices. …”
    Article
  10. 10

    Photogrammetric low-cost unmanned aerial vehicle for pothole detection mapping / Shahrul Nizan Abd Mukti by Abd Mukti, Shahrul Nizan

    Published 2022
    “…The most significant classifier algorithms to distinguish a pothole defect is Maximum likelihood with 29 over 40 band combination win rate. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms by Ridha, Hussein Mohammed

    Published 2020
    “…A new mutation vector inspired by the two-opposite path (2-Opt) algorithm with adaptive mutation scalar (F ) and crossover rate (CR) control parameters were employed to enhance the exploration and exploitation phases of the proposed algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Signal quality measures for pulse oximetry through waveform morphology analysis by Sukor, J. Abdul, Redmond, S. J., Lovell, N. H.

    Published 2011
    “…A mean κ of 0.64 ± 0.22 was obtained, while the mean sensitivity, specificity and accuracy were 89 ± 10%, 77 ± 19% and 83 ± 11%, respectively. Furthermore, a heart rate estimate, extracted from uncontaminated sections of PPG, as identified by the algorithm, was compared with the heart rate derived from an uncontaminated simultaneous ECG signal. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Modeling of road geometry and traffic accidents by hierarchical object-based and deep learning methods using laser scanning data by Sameen, Maher Ibrahim

    Published 2018
    “…In addition, the results also showed that the proposed hierarchical classification method could extract geometric road elements with an average error rate of 6.25% for slope parameter and 6.65% for superelevation parameter, and it is transferable to other regions of similar environments. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Non-fiducial based ECG biometric authentication using one-class support vector machine by Hejazi, Maryamsadat, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Hashim, Shaiful Jahari, Abdul Aziz, Ahmad Fazli, Singh, Yashwant Prasad

    Published 2017
    “…This paper investigates the effect of different parameters of data set size, labeling data, configuration of training and testing data sets, feature extraction, different recording sessions, and random partition methods on accuracy and error rates of these SVM classifiers. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Identifying and detecting unlawful behavior in video images using genetic algorithm / Shahirah Mohamed Hatim by Mohamed Hatim, Shahirah

    Published 2016
    “…The data undergo the pre-processed phase which consists of edge detection, adaptive thresholding segmentation and MATLAB regionprops function for feature extraction. The main goal of the research is to apply the concept of Genetic Algorithm (GA) that can classify hand movements as unlawful behavior in videos. …”
    Get full text
    Get full text
    Thesis
  17. 17

    CAT CHAOTIC GENETIC ALGORITHM BASED TECHNIQUE AND HARDWARE PROTOTYPE FOR SHORT TERM ELECTRICAL LOAD FORECASTING by ISLAM, BADAR UL ISLAM

    Published 2017
    “…The solution set (i.e. optimized weight/bias matrix of ANN) provided by the optimized and improved genetic algorithm and modified BP based model is extracted and used in the design and development of a prototype device of the proposed model. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Obso based fractional pid for mppt-pitch control of wind turbine systems by Mehedi, I.M., Al-Saggaf, U.M., Vellingiri, M.T., Milyani, A.H., Saad, N.B., Yahaya, N.Z.B.

    Published 2022
    “…The OBSO algorithm is derived from the integration of oppositional based learning (OBL) concept with the traditional BSO algorithm in order to improve the convergence rate, which is then applied to effectively choose the parameters involved in the FOPID controller. …”
    Get full text
    Get full text
    Article
  20. 20

    Improved Malware detection model with Apriori Association rule and particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2019
    “…These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article