Search Results - (( using function methods algorithm ) OR ( based observational data algorithm ))
Search alternatives:
- observational data »
- methods algorithm »
- function methods »
- using function »
- data algorithm »
-
1
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…System identification is a method of determining a mathematical relation between variables and terms of a process based on observed input-output data. …”
Get full text
Get full text
Get full text
Article -
2
Evaluation of lightning return stroke current using measured electromagnetic fields
Published 2012“…Moreover, in the proposed method, the attenuation height dependent factor can be determined using measured field while assuming it to be an unknown function based on the engineering model. …”
Get full text
Get full text
Thesis -
3
Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed
Published 2012“…In recent years soft computing methods like fuzzy logic and genetic algorithm are being used in modeling complex processes of hydrologic events. …”
Get full text
Get full text
Thesis -
4
Long term energy demand forecasting based on hybrid, optimization: Comparative study
Published 2012“…The objective of this research is to develop a long term energy demand forecasting model that used hybrid optimization.To accomplish this goal, a hybrid algorithm that combined a genetic algorithm and a local search algorithm method has been developed to overcome premature convergence.Model performances of hybrid algorithm were compared with former single algorithm model in estimating parameter values of an objective function to measure the goodness-of-fit between the observed data and simulated results.Averages error between two models was adopt to select the proper model for future projection of energy demand.…”
Get full text
Get full text
Get full text
Article -
5
Identification of continuous-time hammerstein system using sine cosine algorithm
Published 2019“…The SCA based method is then used to estimate the parameters in both the linear and nonlinear parts based on the given input and output data. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Bayesian inference for the bivariate extreme model
Published 2016“…The bivariate extreme distribution based on logistic dependence function is used to model the extreme observations of two different variables. …”
Get full text
Get full text
Conference or Workshop Item -
7
Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems
Published 2019“…The performance comparison was made only between the SED based method and G-NL-SPSA based method. In addition, the average percentage of the control objective improvement retrieved from the 30 trials for each method was also observed.…”
Get full text
Get full text
Thesis -
8
Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems
Published 2019“…The performance comparison was made only between the SED based method and G-NL-SPSA based method. In addition, the average percentage of the control objective improvement retrieved from the 30 trials for each method was also observed.…”
Get full text
Get full text
Thesis -
9
Application of Optimization Methods for Solving Clustering and Classification Problems
Published 2011“…The data vectors are assigned to the closest cluster and correspondingly to the set, which contains this cluster and an algorithm based on a derivative-free method is applied to the solution of this problem. …”
Get full text
Get full text
Thesis -
10
Metaheuristic optimization techniques for localization in outdoor wireless sensor networks: a comprehensive review
Published 2025“…This paper serves as a comprehensive background on localization algorithms and methods used in wireless sensor networks, offering insights for researchers to develop efficient localization algorithms tailored to specific application requirements in diverse work environments.…”
Get full text
Get full text
Get full text
Get full text
Article -
11
The application of queuing theory model using the DSW Algorithm and the L-R Method to optimize customer flow at Pizza Hut / Anis Natasha Mohamad Nizam, Nurfatihah Nadirah Noor Azla...
Published 2022“…This study aims to compare the behaviors of a queuing system at an order counter using the Fuzzy Queuing Model, which are the Dong, Shah, and Wong (DSW) Algorithm and the Left-Right (L-R) Method. …”
Get full text
Get full text
Student Project -
12
Establishment of spectral subtraction-based algorithm for experimental modal analysis under operating condition
Published 2022“…The direction of ambient response at each frequency band was estimated based on the reconstructed artificial ambient. The artificial ambient was reproduced based on pre-triggered data in measured vibration response. …”
Get full text
Get full text
Thesis -
13
-
14
On some methods of feature engineering useful for craniodental morphometrics of rats, shrews and kangaroos / Aneesha Pillay Balachandran Pillay
Published 2024“…This study proposes using recursive feature elimination (RFE) method to reduce data dimensionality and select the most important attributes based on predictor importance ranking. …”
Get full text
Get full text
Get full text
Thesis -
15
Safe experimentation dynamics algorithm for identification of cupping suction based on the nonlinear Hammerstein model
Published 2023“…This research paper suggests a method to detect the cupping suction model by employing the Hammerstein model and utilizing the Safe Experimentation Dynamics (SED) algorithm. …”
Get full text
Get full text
Get full text
Article -
16
Robust Kernel Density Function Estimation
Published 2010“…The basic idea of RKWF based method is to first define a function which measures the outlying distance of observation. …”
Get full text
Get full text
Thesis -
17
Optimization and control of hydro generation scheduling using hybrid firefly algorithm and particle swarm optimization techniques
Published 2018“…To deal with these problems, this thesis introduces three approved intelligent controllers for hydropower generation. Firstly, a hybrid algorithm namely firefly particle swarm optimization (FPSO) and series division method (SDM) based on the practical swarm optimization and the firefly algorithm is proposed. …”
Get full text
Get full text
Thesis -
18
Penalized LAD-SCAD estimator based on robust wrapped correlation screening method for high dimensional models
Published 2021“…The SIS method uses the rank correlation screening (RCS) algorithm in the pre-screening step and the traditional Pathwise coordinate descent algorithm for computing the sequence of the regularization parameters in the post screening step for onward model selection. …”
Get full text
Get full text
Get full text
Article -
19
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
Published 2020“…Moreover, the value of the solution is evaluated based on the objective function and the Fuzzy C Means (FCM) clustering method used to provide the best results for the overlapping dataset and create the fuzzy membership search domain which includes all possible compromise solutions. …”
Get full text
Get full text
Get full text
Article -
20
Improved genetic algorithm for direct current motor high speed controller implemented on field programmable gate array
Published 2019“…The third methodology is to integrate the proposed controller on FPGA, using a new method to run the design based simulink model. …”
Get full text
Get full text
Thesis
