Search Results - (( _ verification method algorithm ) OR ( variable generation using algorithm ))*
Search alternatives:
- verification method »
- variable generation »
- method algorithm »
- generation using »
- using algorithm »
-
1
Augmentation of basic-line-search and quick-simplex-method algorithms to enhance linear programming computational performance
Published 2021“…Finally, mathematical experimentation is proceeded concerning on verification and validation of the new algorithm. The verification performed through generated random problems via MATLAB has shown the new augmentation algorithm maintains to generate a lesser iteration number from the highest percentage of nonzero coefficients in constraints matrix (80%) and the biggest problem sizes (m = 100, n = 100) until to the lowest percentage of nonzero coefficients in constraints matrix (20%) and the smallest problem sizes (m = 5, n = 5). …”
Get full text
Get full text
Get full text
Thesis -
2
Fuzzy logic-based hill climbing technique for photovoltaic maximum power point tracking converter
Published 2013“…Further experimental setup was carried out for comparative evaluation and the MPPT algorithm was implemented to performance verification of the algorithm by using digital signal processor (TMS320F28335). …”
Get full text
Get full text
Thesis -
3
A single measurement of combined Direct and indirect MPPT algorithm for mismatch PV module application / Mohd Najib Mohd Hussain
Published 2016“…MIC is a promising method to keep the electrical power output from PV module at maximum capacity through maximum power point tracking (MPPT) algorithm during full-sun and mismatch module occurrence. …”
Get full text
Get full text
Thesis -
4
DEVELOPMENT AND TESTING OF UNIVERSAL PRESSURE DROP MODELS IN PIPELINES USING ABDUCTIVE AND ARTIFICIAL NEURAL NETWORKS
Published 2011“…The ANN model has been developed using resilient back-propagation learning algorithm. …”
Get full text
Get full text
Thesis -
5
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
6
Stroke-to-stroke matching in on-line signature verification
Published 2010“…All algorithm and experiments will be carried out using Matlab. …”
Get full text
Get full text
Thesis -
7
Adapting the Elitism on the Greedy Algorithm for Variable Strength Combinatorial Test Cases Generation
Published 2018“…This study presented the most recent variable interaction strength (VS) CT strategy using an enhanced variant in the greedy algorithm. …”
Get full text
Get full text
Get full text
Article -
8
Optimization of hydropower reservoir operation based on hedging policy using Jaya algorithm
Published 2023Article -
9
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…The Speeded-Up Robust Features (SURF) Algorithms is used to determine the interest points. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
-
11
Message based random variable length key encryption algorithm.
Published 2009“…Value of random number should be greater than 35 bits and plaintext must be at least 7 bits. A padding algorithm was used for small size messages or big random numbers. …”
Get full text
Get full text
Article -
12
Offline signature verification using artificial neural network / Mohd Hafiz Hilmi Abdul Ghani
Published 2012“…This project focuses on signature verification using Artificial Neural Network algorithm. …”
Get full text
Get full text
Thesis -
13
Realization of a Hybrid Locally Connected Extreme Learning Machine with DeepID for Face Verification
Published 2023“…Backpropagation algorithms; Computation theory; Deep learning; Face recognition; Iterative methods; Knowledge acquisition; Machine learning; Neural networks; Biological learning; Convolutional neural network; DeepID; Extreme learning machine; Face Verification; Fast implementation; Feature mapping; Labeled faces in the wilds (LFW); Learning algorithms…”
Article -
14
A firefly algorithm based hybrid method for structural topology optimization
Published 2020“…The lower and upper limit of design variables (0 and 1) were used to find initial material distribution to initialize the firefly algorithm based section of the hybrid algorithm. …”
Get full text
Get full text
Article -
15
Adopting A Particle Swarm-Based Test Generator Strategy For Variable-Strength And T-Way Testing
Published 2011“…Recently, researchers have started to explore the use of Artificial Intelligence (AI)-based algorithms as t-way (where t indicates the interaction strength) and variable-strength testing strategies. …”
Get full text
Get full text
Thesis -
16
Maximizing power generation in variable speed micro-hydro with power point tracking
Published 2022“…As such, this paper aims to explore and develop a feasible maximum power point tracker (MPPT) with perturb and observe (P&O) and genetic algorithm (GA) in providing optimal power generation for variable speed micro-hydro system. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
17
Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri
Published 2021“…Verification of algorithm of interpolation method had verified that only two interpolation methods are useable for producing results which are Bilinear Interpolation and Inverse Distance Weighted. …”
Get full text
Get full text
Thesis -
18
An efficient technique for human verification using finger stripes geometry
Published 2007“…This study attempts to improve the performance of person verification by finger stripes geometry, which is an efficient, simple, fast, easy to handle and cost effective compared with other biometric human verification technique. …”
Get full text
Get full text
Get full text
Article -
19
Face identification and verification using PCA and LDA
Published 2008“…PCA is recognized as an optimal method to perform dimension reduction, yet being claimed as lacking discrimination ability. …”
Get full text
Get full text
Conference or Workshop Item -
20
Forecasting hydrological parameters for reservoir system utilizing artificial intelligent models and exploring their influence on operation performance
Published 2019“…The three different optimization algorithms used in this study are the genetic algorithm (GA), particle swarm optimization (PSO) algorithm and shark machine learning algorithm (SMLA). …”
Get full text
Get full text
Article
