Search Results - (( using optimization based algorithm ) OR ( software identification based algorithm ))
Search alternatives:
- software identification »
- identification based »
-
1
Thermoelectric cooler identification based on continuous-time hammerstein model using metaheuristics algorithm
Published 2021“…This paper presents the identification of the Thermoelectric Cooler (TEC) plant using a novel metaheuristic called hybrid Multi-Verse Optimizer with Sine Cosine Algorithm (hMVOSCA) based continuous-time Hammerstein model. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…Optimization algorithms are widely used for the identification of intrusion. …”
Get full text
Get full text
Get full text
Article -
3
Three phase fault algorithm in distribution system by using database approach and impedance based method
Published 2012“…A three phase fault location algorithm using database and impedance based method is utilized in distribution system to locate fault which may occur in any possible fault sections and to optimize the switching operations to reduce the outage time affected by fault. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Document clustering for knowledge discovery using nature-inspired algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Comparative Study of Weighted Product–Dijkstra’s Algorithm and All Possible Path Approach Based on Multiple Criteria and Multi-Dimensions
Published 2020“…All Possible Path Algorithm (APPA) was another algorithm that was also used to rank all the alternatives path based on multiple criteria. …”
Get full text
Get full text
Get full text
Article -
6
Taguchi's method for optimized neural network based autoreclosure in extra high voltage lines
Published 2008“…This paper presents a method to discriminate the temporary faults from the permanent ones in an extra high voltage transmission line so that improper reclosing of the line into a fault is avoided. The fault identification prior to reclosing is based on optimized artificial neural network associated with Levenberg Marquardt algorithm to train the ANN and Taguchi's Method to find optimal parameters of the algorithm and number of hidden neurons. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Autoreclosure in Extra High Voltage Lines using Taguchi’s Method and Optimized Neural Networks
Published 2008“…Abstract – This paper presents a method to discriminate the temporary faults from the permanent ones in an extra high voltage (EHV) transmission line so that improper reclosing of the line onto a fault is avoided. The fault identification prior to reclosing is based on optimized artificial neural network associated with standard Error Back-Propagation, Levenberg Marquardt Algorithm and Resilient Back-Propagation training algorithms together with Taguchi’s Method. …”
Get full text
Get full text
Conference or Workshop Item -
8
Autoreclosure in Extra High Voltage Lines using Taguchi's Method and Optimized Neural Networks
Published 2009“…The algorithms are developed using MATLAB software. A range of faults are simulated on EHV modeled transmission line using SimPowerSytems, and the spectra of the fault data are analyzed using fast Fourier transform to extract features of each type of fault. …”
Get full text
Get full text
Conference or Workshop Item -
9
Autoreclosure in extra high voltage lines using taguchi's method and optimized neural networks
Published 2008“…This paper presents a method to discriminate the temporary faults from the permanent ones in an extra high voltage (EHV) transmission line so that improper reclosing of the line onto a fault is avoided. The fault identification prior to reclosing is based on optimized artificial neural network associated with standard Error Back-Propagation, Levenberg Marquardt Algorithm and Resilient Back-Propagation training algorithms together with Taguchi's Method. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Detecting problematic vibration on unmanned aerial vehicles via genetic-algorithm methods
Published 2024“…The fitness function with the Genetic Algorithm (GA) optimization method is tested and evaluated based on Root Mean Squared Error (RMSE), Mean Absolute Percentage Error (MAPE), and detection time. 51 sets of data have been collected using software in the loop (SITL) methods and are used to determine the effectiveness of the proposed fitness function and GA. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Detecting problematic vibration on unmanned aerial vehicles via genetic-algorithm methods
Published 2024“…The fitness function with the Genetic Algorithm (GA) optimization method is tested and evaluated based on Root Mean Squared Error (RMSE), Mean Absolute Percentage Error (MAPE), and detection time. 51 sets of data have been collected using software in the loop (SITL) methods and are used to determine the effectiveness of the proposed fitness function and GA. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Fuzzy modelling using firefly algorithm for phishing detection
Published 2019“…FA is a nature-inspired algorithm that uses fireflies’ behavior to interpret data. …”
Get full text
Get full text
Get full text
Article -
13
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. …”
Get full text
Get full text
Thesis -
14
Modeling the powder compaction process using the finite element method and inverse optimization
Published 2011“…First, it presents the implementation of the cap constitutive model into ABAQUS FE software using the closest point projection algorithm. …”
Get full text
Get full text
Get full text
Article -
15
Balancing data utility versus information loss in data-privacy protection using k-Anonymity
“…Based on the classification accuracy, the optimal values of k and c are obtained, and thus, the optimal k and c can be used for kanonymity algorithm to anonymize optimal number of columns of the dataset.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Online system identification development based on recursive weighted least square neural networks of nonlinear hammerstein and wiener models.
Published 2022“…This research introduces a developed method for online system identification based on the Hammerstein and Wiener nonlinear block-oriented structure with the artificial neural networks (NN) advantages and recursive weighted least squares algorithm for optimizing neural network learning in real-time. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Direct Adaptive Predictive Control For Wastewater Treatment Plant
Published 2012“…The adaptive control structure is based on the linear model of the process and combined with numerical algorithm for subspace state space system identification (N4SID). …”
Get full text
Get full text
Conference or Workshop Item -
18
Determination of tree stem volume : A case study of Cinnamomum
Published 2013“…Simulations of the best models are done using the Maple software.…”
Get full text
Get full text
Get full text
Thesis -
19
Register Transfer Level Implementation Of Pooling - Based Feature Extraction For Finger Vein Identification
Published 2017“…The proposed algorithm extracted the local feature information of the finger vein pattern (patches), and used these patches to improve the robustness of the identification. …”
Get full text
Get full text
Thesis -
20
Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali
Published 2022“…In this case, the algorithm of the DIS operator is embedded with the Marker-based Watershed segmentation as the assistance of Marker-based Watershed Segmentation is effective in extracting the individual significant edges features produced by DIS operator. …”
Get full text
Get full text
Thesis
