Search Results - (( using function method algorithm ) OR ( based observational methods algorithm ))

Refine Results
  1. 1

    Evaluation of lightning return stroke current using measured electromagnetic fields by Mahdi, Izadi

    Published 2012
    “…Moreover, in the proposed method, the attenuation height dependent factor can be determined using measured field while assuming it to be an unknown function based on the engineering model. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification by Abd Samad, Md Fahmi

    Published 2011
    “…System identification is a method of determining a mathematical relation between variables and terms of a process based on observed input-output data. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed by Borujeni, Sattar Chavoshi

    Published 2012
    “…In recent years soft computing methods like fuzzy logic and genetic algorithm are being used in modeling complex processes of hydrologic events. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Long term energy demand forecasting based on hybrid, optimization: Comparative study by Musa, Wahab, Ku-Mahamud, Ku Ruhana, Yasin, Azman

    Published 2012
    “…The objective of this research is to develop a long term energy demand forecasting model that used hybrid optimization.To accomplish this goal, a hybrid algorithm that combined a genetic algorithm and a local search algorithm method has been developed to overcome premature convergence.Model performances of hybrid algorithm were compared with former single algorithm model in estimating parameter values of an objective function to measure the goodness-of-fit between the observed data and simulated results.Averages error between two models was adopt to select the proper model for future projection of energy demand.…”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Identification of continuous-time hammerstein system using sine cosine algorithm by E. F., Junis, J. J., Jui, Mohd Helmi, Suid, Mohd Ashraf, Ahmad

    Published 2019
    “…The SCA based method is then used to estimate the parameters in both the linear and nonlinear parts based on the given input and output data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Performance optimization on axial-flux permanent magnet coreless generator using novel hybrid computational method based on genetic algorithm and pattern search / Lok Choon Long by Lok , Choon Long

    Published 2016
    “…Improved hybrid optimization method using Pattern Search (PS) and Genetic Algorithm (GA) onto Axial-Flux Permanent Magnet (AFPM) Coreless generator is presented in this thesis, and the optimization is based on the popular multi-objective sizing equation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems by Nor Sakinah, Abdul Shukor

    Published 2019
    “…The performance comparison was made only between the SED based method and G-NL-SPSA based method. In addition, the average percentage of the control objective improvement retrieved from the 30 trials for each method was also observed.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems by Nor Sakinah, Abdul Shukor

    Published 2019
    “…The performance comparison was made only between the SED based method and G-NL-SPSA based method. In addition, the average percentage of the control objective improvement retrieved from the 30 trials for each method was also observed.…”
    Get full text
    Get full text
    Thesis
  10. 10

    Bayesian inference for the bivariate extreme model by Mohd Amin, Nor Azrita, Adam, Mohd Bakri

    Published 2016
    “…The bivariate extreme distribution based on logistic dependence function is used to model the extreme observations of two different variables. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    The application of queuing theory model using the DSW Algorithm and the L-R Method to optimize customer flow at Pizza Hut / Anis Natasha Mohamad Nizam, Nurfatihah Nadirah Noor Azla... by Mohamad Nizam, Anis Natasha, Noor Azlan, Nurfatihah Nadirah, Fazli, Nur Izzati Aliah

    Published 2022
    “…This study aims to compare the behaviors of a queuing system at an order counter using the Fuzzy Queuing Model, which are the Dong, Shah, and Wong (DSW) Algorithm and the Left-Right (L-R) Method. …”
    Get full text
    Get full text
    Student Project
  12. 12

    An alternative method to solve combined economic emission dispatch problems using flower pollination algorithm by Hong, Mee Song

    Published 2016
    “…To simplify the programming, objective of economic dispatch (ED) and emission dispatch (EmD) are combined into a single function by price penalty factor and analysed using weighted sum method to choose the best compromising result. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Improved Hessian approximations with modified secant equations for symmetric rank-one method by Modarres, Farzin, Abu Hassan, Malik, Leong, Wah June

    Published 2011
    “…Symmetric rank-one (SR1) is one of the competitive formulas among the quasi-Newton (QN) methods. In this paper, we propose some modified SR1 updates based on the modified secant equations, which use both gradient and function information. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Application of Optimization Methods for Solving Clustering and Classification Problems by Shabanzadeh, Parvaneh

    Published 2011
    “…This method does not explicitly use derivatives, and is particularly appropriate when functions are non-smooth. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Optimization and control of hydro generation scheduling using hybrid firefly algorithm and particle swarm optimization techniques by Hammid, Ali Thaeer

    Published 2018
    “…To deal with these problems, this thesis introduces three approved intelligent controllers for hydropower generation. Firstly, a hybrid algorithm namely firefly particle swarm optimization (FPSO) and series division method (SDM) based on the practical swarm optimization and the firefly algorithm is proposed. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Investigation of firefly algorithm and chaos firefly algorithm for load prequency control / Zaid Najid by Zaid, Najid

    Published 2015
    “…In order to obtain the best controller parameter values for LFC, Firefly Algorithm (FA) and Chaos Firefly Algorithm (CFA) are used. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Metaheuristic optimization techniques for localization in outdoor wireless sensor networks: a comprehensive review by Gumaida, Bassam, Ibrahim, Adamu Abubakar

    Published 2025
    “…This paper serves as a comprehensive background on localization algorithms and methods used in wireless sensor networks, offering insights for researchers to develop efficient localization algorithms tailored to specific application requirements in diverse work environments.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Penalized LAD-SCAD estimator based on robust wrapped correlation screening method for high dimensional models by Baba, Ishaq Abdullahi, Midi, Habshah, Leong, Wah June, Ibragimov, Gafurjan I.

    Published 2021
    “…The SIS method uses the rank correlation screening (RCS) algorithm in the pre-screening step and the traditional Pathwise coordinate descent algorithm for computing the sequence of the regularization parameters in the post screening step for onward model selection. …”
    Get full text
    Get full text
    Get full text
    Article