Search Results - (( variable detection path algorithm ) OR ( evolution identification using algorithm ))
Search alternatives:
- evolution identification »
- identification using »
- variable detection »
- using algorithm »
- detection path »
- path algorithm »
-
1
Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus
Published 2003“…This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. …”
Get full text
Get full text
Thesis -
2
Hybrid algorithm for NARX network parameters' determination using differential evolution and genetic algorithm
Published 2013“…A hybrid optimization algorithm using Differential Evolution (DE) and Genetic Algorithm (GA) is proposed in this study to address the problem of network parameters determination associated with the Nonlinear Autoregressive with eXogenous inputs Network (NARX-network). …”
Get full text
Get full text
Get full text
Article -
3
-
4
Effective EEG channels for emotion identification over the brain regions using differential evolution algorithm
Published 2019Get full text
Get full text
Conference or Workshop Item -
5
Hybrid DE-PEM algorithm for identification of UAV helicopter
Published 2014“…Purpose – The purpose of this paper is to develop a hybrid algorithm using differential evolution (DE) and prediction error modeling (PEM) for identification of small-scale autonomous helicopter state-space model. …”
Get full text
Get full text
Get full text
Article -
6
Autotuning PID Controllers for Quadplane Hybrid UAV using Differential Evolution Algorithm
Published 2024“…The unified RBF model is then used for autotuning the PID controller using the DE algorithm. …”
Get full text
Get full text
Get full text
Article -
7
Autotuning PID Controllers for Quadplane Hybrid UAV using Differential Evolution Algorithm
Published 2024“…The unified RBF model is then used for autotuning the PID controller using the DE algorithm. …”
Get full text
Get full text
Get full text
Article -
8
Nonlinear identification of a small scale unmanned helicopter using optimized NARX network with multiobjective differential evolution
Published 2014“…This study proposes a hybrid of conventional back propagation training algorithm for the NARX network and multiobjective differential evolution (MODE) algorithm for identification of a nonlinear model of an unmanned small scale helicopter from experimental flight data.The proposed hybrid algorithm was able to produce models with Pareto-optimal compromise between the design objectives. …”
Get full text
Get full text
Get full text
Article -
9
-
10
IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE
Published 2017“…Selected basic behaviour-based algorithms such as wallfollower, obstacle avoidance, escape route and target detection are to be combined and its efficiency is measured. …”
Get full text
Get full text
Final Year Project -
11
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…Differential evolution (DE) is a simple yet powerful evolutionary algorithm (EA). …”
Get full text
Get full text
Thesis -
12
Performance of well known packet scheduling algorithms in the downlink 3GPP LTE system
Published 2009“…This paper contributes to the identification of a suitable packet scheduling algorithm for use in the downlink 3GPP LTE system supporting video streaming services. …”
Get full text
Get full text
Get full text
Proceeding Paper -
13
A real-time integrated fire detection and alarm (FDA) system for network based building automation
Published 2017“…Methods/Analysis: In this work, the shortest path algorithm was chosen for series of buildings connected by a fiber-optic network. …”
Get full text
Get full text
Get full text
Article -
14
LED based NIR spectroscopy for detection of lard adulteration in palm oil via chemometrics / Katrul Nadia Basri
Published 2017“…In order to remove the uninformative variables, cumulative adaptive reweighted sampling (CARS) has been performed. …”
Get full text
Get full text
Thesis -
15
Performance analysis of two component carrier selection algorithms in the downlink LTE-A
Published 2013“…Performance evaluation is conducted using the the downlink Long Term Evolution-Advanced (LTE-A) as the simulation platform. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…Then, the damage severities at the identified locations are assessed using genetic algorithm (GA), through defining a database to reveal the relationships between the energies obtained and damage severities. …”
Get full text
Get full text
Get full text
Thesis -
17
The exploration of hybrid metaheuristics-based approaches: A bibliometric analysis
Published 2025“…The rapid evolution of computational intelligence has driven significant interest in hybrid metaheuristics, which combine multiple optimization algorithms to solve complicated problems more efficiently. …”
Get full text
Get full text
Get full text
Article -
18
Enhancing Wearable-Based Human Activity Recognition with Binary Nature-Inspired Optimization Algorithms for Feature Selection
Published 2026“…This research paper explores the performance of binary nature-inspired optimization algorithms as feature selection to enhance the identification of human activities using wearable technology. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
Published 2021“…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
Get full text
Get full text
Thesis -
20
Fingerprint frontier: the evolution of biometric security
Published 2023“…The field of fingerprint biometrics is a cornerstone in the quest for accurate and efficient identity verification in today's growing landscape of security and identification technology. It have been used as a unique identifier for ages, but in our modern era, It have emerged as a cornerstone in the area of security and identity. …”
Get full text
Get full text
Get full text
Book
