Search Results - (( using action method algorithm ) OR ( basic integration modified algorithm ))
Search alternatives:
- integration modified »
- basic integration »
- method algorithm »
- action method »
- using action »
-
1
Integration of enchanced jump point search (JPS) algorithm with modified bresenham technique for path planning in virtual grid-based environment
Published 2018“…We demonstrate our framework; the integration of enhanced Jump Point Search algorithm with modified Bresenham for heuristic computation in virtual grid-based environment. …”
Get full text
Get full text
Get full text
Thesis -
2
Fuzzy algorithm for 3D coastal gemorphology mapping by DInSAR
Published 2007“…The basic concept of fuzzy algorithm was used to filter DInSAR data. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Implementation of UPFC model into fast decoupled load flow
Published 2004“…By using this approach, the basic Fast decoupled algorithm can be added with functionality to analyze UPFC without the need to modify the whole algorithm, which will require minimum modification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
STUDIES ON COMPARISON OF PROPORTIONAL ON ERROR WITH PROPORTIONAL ON MEASURED VALUE IN PID CONTROLLERS
Published 2019“… PID Controllers have different algorithms or methods in which the controller action is based on Error or Process Variable (PV). …”
Get full text
Get full text
Final Year Project -
5
An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization
Published 2019“…We then evaluated the Improved AKF algorithm with the-state-of-the-art algorithms in terms of compression ratio using Paul videos and Shih-Tang dataset. …”
Get full text
Get full text
Article -
6
Utilizing of flower pollination algorithm for brushless DC motor speed controller
Published 2020“…If the PID controller is modified with a new algorithm, better results can be obtained from the BLDC motor. …”
Get full text
Get full text
Get full text
Proceeding Paper -
7
Design of nonlinear adaptive interaction algorithm controller for improvement of tracking performance of X-Y table ball screw drive system
Published 2023“…The NAIA controller is designed by integrating a modified nonlinear function to the base AIA controller. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Revolutionizing video analytics: a review of action recognition using 3D
Published 2024“…As an interdisciplinary field, the 3D video action recognition model interprets human actions in three-dimensional video data using approaches such as pose-based, volumetric, motionbased, and hybrid methods. 3D video action recognition finds application in surveillance, sports analysis, human-computer interaction, healthcare, robotics, and augmented/virtual reality. …”
Get full text
Get full text
Article -
9
Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof
Published 2019“…From the reviews, it is evident that autonomous system is set to handle finite number of encountered states using finite sequences of actions. In order to learn the optimized states-action policy the self-learning algorithm is developed using hybrid AI algorithm by combining unsupervised weightless neural network, which employs AUTOWiSARD and reinforcement learning algorithm, which employs Q-learning. …”
Get full text
Get full text
Thesis -
10
Application of Mellin-Kamal transformation in EL Gamal Ciphertext Cryptosystem / Nurul Syazwani Husairi and Nurul Aqilah Mohd Fauzi
Published 2023“…Our main objective is to compute encryption process and develop decryption schemes using Mellin Transformation and to modify the basic El Gamal system with the application of Mellin-Kamal Transformation. …”
Get full text
Get full text
Student Project -
11
Simulation of an adaptive artificial neural network for power system security enhancement including control action
Published 2015“…This paper presents a new method for enhancing power system security, including a remedial action, using an artificial neural network (ANN) technique. …”
Get full text
Get full text
Get full text
Article -
12
A new ant based rule extraction algorithm for web classification
Published 2011Get full text
Get full text
Get full text
Get full text
Monograph -
13
Improving modified cocomo ii artificial neural network using hyperbolic tangent activation function
Published 2017“…The proposed activation function has been trained and tested using two different architectures of NN which are basic COCOMO II-NN and modified COCOMO II-NN that uses COCOMO II NASA93 dataset. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Particle swarm optimization with deep learning for human action recognition
Published 2021“…This paper proposes a deep learning framework for human action recognition to overcome the drawbacks of the current state-of-the-art methods. …”
Get full text
Get full text
Article -
15
Adaptive artificial neural network for power system security assessment and control action
Published 2012“…This is particularly important for giving a possible control action to mitigate an insecure situation during disturbance using AANN. …”
Get full text
Get full text
Thesis -
16
Newton competitive genetic algorithm method for optimization the production of biochemical systems
Published 2018“…In this work, the optimization of biochemical systems production is performed by using a hybrid method of Newton competitive genetic algorithm is presented. …”
Get full text
Get full text
Article -
17
Property premises intruders detection using face recognition method / Joveni Henry
Published 2017“…Every property premises owner have already taken some action to protect their property premises and safety by using all kinds of methods. …”
Get full text
Get full text
Thesis -
18
Digital forensic investigation reduction model (DIFReM) for Windows 10 OS
Published 2018“…Also, a hash integrity comparison was performed on all files. By putting a very few files (12) in such large dataset, we made it more difficult to detect but the tool detected all modified files, added files, deleted files with modified file header, files with changed extension and also files with failed hash verification – this represented a 100% detection rate. …”
Get full text
Get full text
Thesis -
19
The effectiveness of using the Lattice in multiplication skills among Year 5 in SK Beradek / Muhamad Shaharudin Muhamad Sarip
Published 2015“…This research focuses on efforts to help improve the skills of multiplication by using Lattice method among the pupils in Year 5 at SK Beradek. …”
Get full text
Get full text
Thesis -
20
Object Isolation In A Random Environment Using Manipulation Primitives Approach
Published 2019“…The algorithm was demonstrated using a KUKA Youbot with a camera fitted above the workspace. …”
Get full text
Get full text
Get full text
Get full text
Thesis
