Search Results - (( using extraction method algorithm ) OR ( using ((function path) OR (function a)) algorithm ))

Refine Results
  1. 1

    Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms by Ridha, Hussein Mohammed

    Published 2020
    “…In the sizing of the SAPV system, the mutation adaptive DE (MADE) algorithm based multi-objective functions minimizes three constraint objective functions. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine by Fathi Mahdi Elsiddig Haroun, Mr.

    Published 2023
    “…The SVM algorithm has been used to detect high- and low-density vegetation regions from the extracted ROI. …”
    text::Thesis
  3. 3

    Synthesis of transistor chaining algorithm for CMOS cell layout using euler path / Sukri Hanafiah by Hanafiah, Sukri

    Published 1997
    “…The euler's path it using pseudo input and Heuristic algorithm to find the minimum interlace. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A fingerprint matching algorithm using bit-plane extraction method with phase-only correlation by Florence, Francis-Lothai, Bong, David B L

    Published 2017
    “…Region of interest (ROI) of a fingerprint image is extracted by using a modified blob analysis method, and then the core point of the ROI is detected for dimension reduction process. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    A-star (A*) algorithm implementation for robotics path planning navigation by Emirul Ridzwan, Nor Azmi

    Published 2018
    “…This algorithm also known as the most famous used algorithm in path planning because of its ability to provide a collision-free pathway with a minimum path score. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6
  7. 7

    Pashto language stemming algorithm by Aslamzai, Sebghatullah, Saidah Saad

    Published 2015
    “…Furthermore, the accuracy and strength of the proposed algorithm is evaluated using word count method. To validate the function of the developed algorithm, two native speakers of Pashto were recruited to evaluate the algorithm in terms of its accuracy and strength. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Cuckoo search algorithm and wind driven optimization based study of satellite image segmentation for multilevel thresholding using Kapur’s entropy by Bhandari, A.K., Singh, V.K, Kumar, A., Singh, G.K.

    Published 2014
    “…This algorithm is used to obtain the best solution or best fitness value from the initial random threshold values, and to evaluate the quality of a solution, correlation function is used. …”
    Get full text
    Get full text
    Article
  9. 9

    Utilizing artificial bee colony algorithm as feature selection method in Arabic text classification by Hijazi, Musab, Zeki, Akram M., Ismail, Amelia Ritahani

    Published 2023
    “…Support Vector Machine and Naïve Bayes classifiers were used as a fitness function for the ABC algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Hybrid path planning for indoor robot with Laplacian Behaviour-based control via four point-explicit group by Azali Saudi, Jumat Sulaiman

    Published 2014
    “…Consequently, the gradient of the potential functions would be used by the searching algorithm to generate path from starting to goal location. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Jogging activity recognition using k-NN algorithm by Afifah Ismail

    Published 2022
    “…The k-NN algorithm is a simple and easy-to-implement supervised machine learning algorithm that can be used to solve both classification and regression problems. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  13. 13
  14. 14

    Wi-fi fingerprint database construction using Chebyshev wavelet functions by Narzullaev, Anvar, Nemadaliev, Azamjon, Selamat, Mohd Hasan, Othman, Mohamed, Sharif, Khaironi Yatim

    Published 2015
    “…Next, the collected reference samples are used to construct area specific path-loss prediction function using Chebyshev wavelets. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16

    False path identification algorithm framework for nonseparable controller-data path circuits by Shaheen, A.-U.-R., Hussin, F.A., Hamid, N.H.

    Published 2017
    “…This paper proposes an algorithm framework to deal with these false paths through identification for DFT test. …”
    Get full text
    Get full text
    Article
  17. 17

    Using genetic algorithms as image watermarking performance optimizer / Zuhaili Zahid by Zahid, Zuhaili

    Published 2008
    “…Image watermarking is a method to hide a message in an image for transmission of secret data or identification purposes. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Logic Programming In Radial Basis Function Neural Networks by Hamadneh, Nawaf

    Published 2013
    “…I used different types of optimization algorithms to improve the performance of the neural networks. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Application of harmonic functions through Modified SOR (MSOR) method for robot path planning in indoor structured environment by Azali Saudi, Jumat Sulaiman

    Published 2017
    “…It is known that harmonic functions are very suitable to be used as a global approach for robot path planning. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Nlfxlms and thf-nlfxlms algorithms for wiener-hammerstein nonlinear active noise control by Srazhidinov, Radik

    Published 2016
    “…In recent works, it was shown that the SEF can be approximated using tangential hyperbolic function (THF) for Hammerstein and Wiener NLFXLMS algorithms, such that the degree of nonlinearity can be estimated using modelling approach. …”
    Get full text
    Get full text
    Thesis