Search Results - (( using solution using algorithm ) OR ( using identification using algorithm ))
Search alternatives:
- using identification »
- identification using »
- using algorithm »
- using solution »
- solution using »
-
1
Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus
Published 2003“…This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. …”
Get full text
Get full text
Thesis -
2
-
3
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…The second modification develops a new position update mechanism using the Bat Algorithm movement. The third modification improves the controlled parameter of the MBGWO algorithm using indicators from the search process to refine the solution. …”
Get full text
Get full text
Thesis -
4
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…Using a novel firewall framework designed in this dissertation, an algorithm adapted from research by Yan, Wu, Luo, & Zhang (2013) was used for the P2P identification method. …”
Get full text
Get full text
Thesis -
5
Identification of continuous-time hammerstein model using improved archimedes optimization algorithm
Published 2024“…Therefore, this article identified various continuous-time Hammerstein models based on an improved Archimedes optimization algorithm (IAOA) to address these concerns. The proposed algorithm employed two principal modifications to mitigate these issues and enhance identification accuracy: (i) exploration and exploitation phase recalibrations using a revised density decreasing factor and (ii) local optima entrapment alleviation utilizing safe experimentation dynamics. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Missing tags detection algorithm for radio frequency identification (RFID) data stream
Published 2019“…AC complement algorithm was used to compare the different in each set of data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Hardware Software Partitioning Using Particle Swarm Optimization (PSO) In Image Processing Application
Published 2018“…In this project, car plate identification will be implemented in hardware-software partitioning by using PSO algorithm. …”
Get full text
Get full text
Monograph -
8
Optimization of drilling path using the bees algorithm
Published 2021“…Optimization is the process of finding the best possible solutions to a problem. It has been widely used in various areas especially in engineering problems. …”
Get full text
Get full text
Get full text
Article -
9
A hybrid metaheuristic algorithm for identification of continuous-time Hammerstein systems
Published 2021“…This paper presents a new hybrid identification algorithm called the Average Multi-Verse Optimizer and Sine Cosine Algorithm for identifying the continuous-time Hammerstein system. …”
Get full text
Get full text
Article -
10
Identification of continuous-time model of hammerstein system using modified multi-verse optimizer
Published 2021“…In particular, the search capacity of the MVO algorithm has been improved using the sine and cosine functions of the Sine Cosine Algorithm (SCA) that will be able to balance the processes of exploration and exploitation. …”
Get full text
Get full text
Thesis -
11
Nonlinear auto-regressive model structure selection using binary particle swarm optimization algorithm / Ahmad Ihsan Mohd Yassin
Published 2014“…The algorithm searches the solution space by selecting various model structures and evaluating its fitness. …”
Get full text
Get full text
Thesis -
12
Novel algorithms of identifying types of partial discharges using electrical and non-contact methods / Mohammad Shukri Hapeez
Published 2015“…The PD data acquired from electrical method was used to test the FPDI. The comparison was made based on the less hardware used for detection while sustain the identification accuracy. …”
Get full text
Get full text
Thesis -
13
Analysis of Toothbrush Rig Parameter Estimation Using Different Model Orders in Real Coded Genetic Algorithm (RCGA)
Published 2024“…Generation gap used was 0.5 has shorten the algorithm conver-gence time without affecting the model accuracy.…”
Article -
14
Investigating optimal smartphone placement for identifying stairs movement using machine learning
Published 2023“…In addition, since smartphones are available to a wide group of people, a low-cost solution for human activity identification can be realized, without requiring the use of external sensors and circuitry.…”
Get full text
Get full text
Get full text
Get full text
Article -
15
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
Published 2021“…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
Get full text
Get full text
Thesis -
16
Novel algorithms of identifying types of Partial Discharges using electrical and non-contact methods / Mohammad Shukri Hapeez
Published 2015“…Two novel algorithms are presented in this wok namely ‘Simple Partial Discharge Identifier (SPDI) and Fundamental Partial Discharge Identifier (FPDI) were developed to overcome the PD identification shortcoming……”
Get full text
Get full text
Book Section -
17
Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat
Published 2008“…Consequently, another algorithm for maximum loadability identification using EP optimization technique was also developed. …”
Get full text
Get full text
Thesis -
18
Analysis of toothbrush rig parameter estimation using different model orders in Real-Coded Genetic Algorithm (RCGA)
Published 2018“…Generation gap used was 0.5 has shorten the algorithm convergence time without affecting the model accuracy.…”
Get full text
Article -
19
Simulated real-time controller for tuning algorithm using modified hill climbing approach
Published 2014“…Although all adaptive control tuning methodologies depend partially or completely on online plant system identification, the proposed method uses only the model that is used to design the original controller, leading to simplified calculations that require neither high processing power nor long processing time, as opposed to identification techniques calculations. …”
Get full text
Get full text
Thesis -
20
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…To achieve the aim of this study, Design Science methodology was used through three main phases: problem identification, design of solution, and evaluation. …”
Get full text
Get full text
Get full text
Thesis
