Search Results - (( using identification based algorithm ) OR ( using function max algorithm ))
Search alternatives:
- using identification »
- identification based »
- using function »
- max algorithm »
- function max »
-
1
Fractal coding of bio-metric image for face authentication
Published 2021“…In the encoding, the fractal function converges to its self-similarity as IFS. …”
Get full text
Get full text
Thesis -
2
Maximum 2-satisfiability in radial basis function neural network
Published 2020“…This paper presents a new paradigm in using MAX2SAT by implementing in Radial Basis Function Neural Network (RBFNN). …”
Get full text
Get full text
Get full text
Article -
3
Fair uplink bandwidth allocation and latency guarantee for mobile WiMAX using fuzzy adaptive deficit round robin
Published 2014“…In this paper, an efficient bandwidth allocation algorithm for the uplink traffic in mobile WiMAX is proposed. …”
Get full text
Get full text
Get full text
Article -
4
Statistical data preprocessing methods in distance functions to enhance k-means clustering algorithm
Published 2018“…We introduced two new approaches to normalization techniques to enhance the K-Means algorithms. This is to remedy the problem of using the existing Min-Max (MM) and Decimal Scaling (DS) techniques, which have overflow weakness. …”
Get full text
Get full text
Get full text
Thesis -
5
Effective downlink resource management for wimax networks
Published 2018“…Our EDRM framework involves three functions: Class-Based Scheduling (CBS) algorithm, Dynamic Bandwidth Allocation (DBA) scheme and Link Session Management (LSM) policy. …”
Get full text
Get full text
Thesis -
6
Modern fuzzy min max neural networks for pattern classification
Published 2019“…To build an efficient classifier model, researchers have introduced hybrid models that combine both fuzzy logic and artificial neural networks. Among these algorithms, Fuzzy Min Max (FMM) neural network algorithm has been proven to be one of the premier neural networks for undertaking the pattern classification problems. …”
Get full text
Get full text
Thesis -
7
Single Fitness Function to Optimize Energy using Genetic Algorithms for Wireless Sensor Network
Published 2024journal::journal article -
8
-
9
Hybrid DE-PEM algorithm for identification of UAV helicopter
Published 2014“…Design/methodology/approach – In this study, flight data were collected and analyzed; MATLAB-based system identification algorithm was developed using DE and PEM; parameterized state-space model parameters were estimated using the developed algorithm and model dynamic analysis. …”
Get full text
Get full text
Get full text
Article -
10
Identification of continuous-time hammerstein system using sine cosine algorithm
Published 2019“…This paper presents the development of identification of continuous-time Hammerstein systems based on Sine Cosine Algorithm (SCA). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Thermoelectric cooler identification based on continuous-time hammerstein model using metaheuristics algorithm
Published 2021“…This paper presents the identification of the Thermoelectric Cooler (TEC) plant using a novel metaheuristic called hybrid Multi-Verse Optimizer with Sine Cosine Algorithm (hMVOSCA) based continuous-time Hammerstein model. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Identification of power poles based on satellite stereo images using graph-cut algorithm
Published 2015“…In conclusion, based on the results, Our proposed Graph-Cut algorithm produces more accurate disparity maps than the existing matching algorithm used for disparity calculation.…”
Get full text
Get full text
Conference or Workshop Item -
13
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…A deterministic mutation-based algorithm is introduced to overcome this problem. …”
Get full text
Get full text
Get full text
Article -
14
Adaptive RS-group scheduling for WiMAX multihop relay
Published 2010“…This paper proposes mesh topology for IEEE 802.16j using adaptive RS group scheduling. The proposed scheduling algorithm introduces new signalling to support functions such as soft and hard horizontal-RS neighbour scanning, bandwidth request, forwarding of PDUs and connection management. …”
Get full text
Get full text
Get full text
Proceeding Paper -
15
Date store management in sliding window based on-line identification algorithms
Published 2001Get full text
Get full text
Conference or Workshop Item -
16
Data mining based damage identification using imperialist competitive algorithm and artificial neural network
Published 2018“…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
Get full text
Get full text
Article -
17
Smoothed functional algorithm with norm-limited update vector for identification of continuous-time fractional-order Hammerstein Models
Published 2024“…This article proposes an identification method of continuous-time fractional-order Hammerstein model using smoothed functional algorithm with a norm-limited update vector (NL-SFA). …”
Get full text
Get full text
Get full text
Article -
18
Identification of the thermoelectric cooler using hybrid multi-verse optimizer and sine cosine algorithm based continuous-time Hammerstein model
Published 2021“…This paper presents the identification of the ThermoElectric Cooler (TEC) plant using a hybrid method of Multi-Verse Optimizer with Sine Cosine Algorithm (hMVOSCA) based on continuous-time Hammerstein model. …”
Get full text
Get full text
Get full text
Article -
19
Designing and Developing an Intelligent Congkak
Published 2011“…Therefore the project want to try to rectify this issue by trying to develop an Intelligent Congkak System that also implemented NN and try answer research question such as this: “What is the best Congkak evaluation function for training NN for game playing?” and “Can Min-Max algorithm (MM) be speeded up by using NN as a forward-pruning method?”. …”
Get full text
Get full text
Get full text
Thesis -
20
Iterative closed-loop identification of MIMO systems using ARX-based Leaky Least Mean Square Algorithm
Published 2014Get full text
Get full text
Conference or Workshop Item
