Search Results - (( using evolution method algorithm ) OR ( based identification method algorithm ))
Search alternatives:
- identification method »
- based identification »
- evolution method »
- method algorithm »
- using evolution »
-
1
Mixed Unscented Kalman Filter and differential evolution for parameter identification
Published 2013“…This paper presents parameters estimation techniques for coupled industrial tanks using the mixed Unscented Kalman Filter (UKF) and Differential Evolution (DE) method. …”
Get full text
Get full text
Get full text
Article -
2
Autotuning PID Controllers for Quadplane Hybrid UAV using Differential Evolution Algorithm
Published 2024“…The paper presents a method for autotuning attitude PID for a quadplane UAV using differential evolution (DE), X-Plane simulation, and neural network (NN)-based system identification. …”
Get full text
Get full text
Get full text
Article -
3
Autotuning PID Controllers for Quadplane Hybrid UAV using Differential Evolution Algorithm
Published 2024“…The paper presents a method for autotuning attitude PID for a quadplane UAV using differential evolution (DE), X-Plane simulation, and neural network (NN)-based system identification. …”
Get full text
Get full text
Get full text
Article -
4
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…This resulted in the high accuracy of the damage detection algorithm. The second proposed method seeks to identify damage in the structural parameters of linear and nonlinear systems. …”
Get full text
Get full text
Get full text
Thesis -
5
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…Differential evolution (DE) is a simple yet powerful evolutionary algorithm (EA). …”
Get full text
Get full text
Thesis -
6
Enhancing Wearable-Based Human Activity Recognition with Binary Nature-Inspired Optimization Algorithms for Feature Selection
Published 2026“…The experiment results show how these algorithms could be used to improve methods for recognizing human activities using wearables technology, such as feature selection, parameter adjustment, and model optimization.…”
Get full text
Get full text
Get full text
Get full text
Article -
7
Systematic literature review: Trend analysis on the design of lightweight block cipher
Published 2024journal::journal article -
8
OPTIMIZATION OF HYBRID-FUZZY CONTROLLER FOR SERVOMOTOR CONTROL USING A MODIFIED GENETIC ALGORITHM
Published 2011“…Many tuning methods for PID controller have been developed, and one of them is based on natural evolution, the genetic algorithm (GA). …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Recursive Subspace Identification Algorithm Using The Propagator Based Method
Published 2017“…In this paper, the recursive subspace identification algorithm based on the propagator method which avoids the SVD computation is proposed. …”
Get full text
Get full text
Get full text
Article -
10
Parameter Estimation Using Improved Differential Evolution And Bacterial Foraging Algorithms To Model Tyrosine Production In Mus Musculus(Mouse)
Published 2015“…The hybrid of Differential Evolution algorithm with Kalman Filtering and Bacterial Foraging algorithm is a novel global optimisation method implemented to obtain the best kinetic parameter value. …”
Get full text
Get full text
Get full text
Article -
11
Parameter extraction of photovoltaic module using hybrid evolutionary algorithm
Published 2023Conference Paper -
12
Smoothed functional algorithm with norm-limited update vector for identification of continuous-time fractional-order Hammerstein Models
Published 2024“…In particular, the standard smoothed functional algorithm (SFA) based method is modified by implementing a limit function in the update vector of the standard SFA based method to solve the issue of high tendency of divergence during the identification process. …”
Get full text
Get full text
Get full text
Article -
13
Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus
Published 2003“…This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. A multilayer feed-forward artificial neural network (ANN) with evolution programming learning algorithm for calculation of voltage stability margins (VSM). …”
Get full text
Get full text
Thesis -
14
Optimisation of Biochemical Systems Production using Hybrid of Newton Method, Differential Evolution Algorithm and Cooperative Coevolution Algorithm
Published 2017“…This paper present a hybrid method of Newton method, Differential Evolution Algorithm (DE) and Cooperative Coevolution Algorithm (CCA). …”
Get full text
Get full text
Get full text
Article -
15
-
16
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…System identification is a method of determining a mathematical relation between variables and terms of a process based on observed input-output data. …”
Get full text
Get full text
Get full text
Article -
17
Identification of power poles based on satellite stereo images using graph-cut algorithm
Published 2015“…The method is based on Graph-Cut algorithm which applied on satellite stereo images. …”
Get full text
Get full text
Conference or Workshop Item -
18
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…iii The summarizing strategies identification module relies on a set of heuristic rules, statistical and linguistic methods such as position-based method, title-based method, cue-phrase method and word-frequency method to identify the summarizing strategies employed by students. …”
Get full text
Get full text
Thesis -
19
-
20
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article
