Search Results - (( variable extraction schemes algorithm ) OR ( parallel optimization sensor algorithm ))
Search alternatives:
- parallel optimization »
- variable extraction »
- optimization sensor »
- schemes algorithm »
- sensor algorithm »
-
1
Simulated kalman filter (SKF) based image template matching for distance measurement by using stereo vision system
Published 2018“…Stereo vision sensor consists of two stereo cameras, mounted parallel in stationary position. …”
Get full text
Get full text
Thesis -
2
Towards Enhancing the Performance of Grid-Tied VSWT via Adopting Sine Cosine Algorithm-Based Optimal Control Scheme
Published 2021“…This paper is aimed at introducing a novel application of the sine cosine algorithm (SCA) which attempts to find the optimal gains of proportional-integral (PI) controllers used to control the power electronic converters (PEC) equipped with the variable speed wind turbine (VSWT) such that a maximum power extraction and performance enhancement can be realized. …”
Get full text
Get full text
Article -
3
Single-objective and multi-objective optimization algorithms based on sperm fertilization procedure / Hisham Ahmad Theeb Shehadeh
Published 2018“…The obtained results are compared with the results of four algorithms. These algorithms are Genetic Algorithms (GA), Parallel Genetic Algorithm (PGA), Particle Swarm Optimization (PSO) and Accelerated Particle Swarm Optimization (APSO). …”
Get full text
Get full text
Get full text
Thesis -
4
Performance monitoring algorithm for optimizing electrical power generated by using photovoltaic system
Published 2016Get full text
Get full text
Conference or Workshop Item -
5
-
6
Estimation of core size distribution of magnetic nanoparticles using high-Tc SQUID magnetometer and particle swarm optimizer-based inversion technique
Published 2023“…In this work, the core size estimation technique of magnetic nanoparticles (MNPs) using the static magnetization curve obtained from a high-Tc SQUID magnetometer and a metaheuristic inversion technique based on the Particle Swarm Optimizer (PSO) algorithm is presented. The high-Tc SQUID magnetometer is constructed from a high-Tc SQUID sensor coupled by a flux transformer to sense the modulated magnetization signal from a sample. …”
Get full text
Get full text
Get full text
Article -
7
Perturbation stochastic model updating of a bolted structure / Mohamad Azam Shah Aziz Shah
Published 2022“…The scheme was developed by introducing a multidimensional analysis consisting of a systematic quasi-random sampling algorithm. …”
Get full text
Get full text
Thesis -
8
Online teleoperation of writing manipulator through graphics processing unit based accelerated stereo vision
Published 2021“…These algorithms are then parallelized using Compute Unified Device Architecture CUDA C language to run on Graphics Processing Unit GPU for hardware acceleration. …”
Get full text
Get full text
Thesis -
9
CAT CHAOTIC GENETIC ALGORITHM BASED TECHNIQUE AND HARDWARE PROTOTYPE FOR SHORT TERM ELECTRICAL LOAD FORECASTING
Published 2017“…In the hybrid scheme, the initial parameters of the modified BP neural network are optimized by using the global search ability of genetic algorithm, improved by cat chaotic mapping to enrich its optimization capability. …”
Get full text
Get full text
Thesis -
10
-
11
Fuzzy logic-based hill climbing technique for photovoltaic maximum power point tracking converter
Published 2013“…Simulation results are presented to validate performance of the algorithm under different irradiation schemes, and to compare with the results obtained from conventional algorithm. …”
Get full text
Get full text
Thesis -
12
DC-based PV-powered home energy system
Published 2017“…A controller based on an algorithm of one time maximum power point (MPP) is proposed to mitigate those losses. …”
Get full text
Get full text
Thesis -
13
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…An Integrated Anomaly Detection Scheme ( IADS) is proposed to overcome the aforesaid drawbacks. …”
Get full text
Get full text
Thesis -
14
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Many programming languages are used for programming; Java programming language is known to be most common due to its features, the use of this popular language increases an attacker's ability to steal intellectual property (IP), as the source program is translated to an intermediate format retaining most of the information such as meaningful variables names present in source code. An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
Get full text
Get full text
Thesis
