Search Results - (( based identification method algorithm ) OR ( program validation using algorithm ))
Search alternatives:
- identification method »
- based identification »
- program validation »
- method algorithm »
- validation using »
- using algorithm »
-
1
System identification using Extended Kalman Filter
Published 2017“…In order to evaluate the performance of the EKF learning algorithm, the proposed algorithm validation were analyzed using model validation methods as a checker such as One Step Ahead (OSA) and correlation coefficient (R2). …”
Get full text
Get full text
Student Project -
2
A Framework for Green Energy Resources Identification and Integration Supported by Real-Time Monitoring, Control, and Automation Applications
Published 2025“…Following site identification, an improved Geographical Information System-driven fuzzy Traveling Salesman Problem-Binary Integer Programming algorithm was proposed to integrate these sites into a reliable ring-based system topology, aiming to achieve a zero-carbon footprint. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Discrete-time system identification using genetic algorithm with single parent-based mating technique
Published 2024“…The methodology encompasses data acquisition, GA program development, SPM technique implementation, and simulation using MATLAB. …”
Get full text
Get full text
Get full text
Thesis -
4
Fault location identification in power transmission networks: using novel nonintrusive fault-monitoring systems
Published 2021“…After the processes of feature selection, the fault-location indicator is recognized by the support vector machines (SVMs). To examine and validate the proposed methodology, various fault types in a sample power system are simulated by using the electromagnetic transient program (EMTP). …”
Get full text
Get full text
Get full text
Article -
5
A single measurement of combined Direct and indirect MPPT algorithm for mismatch PV module application / Mohd Najib Mohd Hussain
Published 2016“…The development of the system is carried out using Matlab/Simulink incorporated with MPLAB programming for evaluating and validating the system. …”
Get full text
Get full text
Thesis -
6
Fault location identification in power transmission networks using novel non-intrusive fault monitoring systems
Published 2020“…After the processes of feature selection, the fault location indicator is recognized by the support vector machines (SVMs). To examine and validate the proposed methodology for constructing power transmission networks, various fault types are simulated by using electromagnetic transients program (EMTP). …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Validation of deep convolutional neural network for age estimation in children using mandibular premolars on digital panoramic dental imaging / Norhasmira Mohammad
Published 2022“…The semi-automated dental staging system developed in this study is based on the Malay children’s population and uses a brain-inspired learning algorithm termed "deep learning". …”
Get full text
Get full text
Thesis -
8
Accuracy of advanced deep learning with tensorflow and keras for classifying teeth developmental stages in digital panoramic imaging
Published 2022“…Results: Image segmentation using the DP-AC algorithm enhanced the visibility of the image features in the region of interest while suppressing the image’s background noise. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
-
10
New techniques incorporating computational intelligence based for voltage stability evaluation and improvement in power system / Nur Fadilah Ab. Aziz
Published 2014“…Another new hybrid algorithm that used Evolutionary Programming (EP) termed as Evolutionary Support Vector Machine (ESVM) was also developed for comparative study. …”
Get full text
Get full text
Thesis -
11
Implementation of Hybrid Indexing, Clustering and Classification Methods to Enhance Rural Development Programme in South Sulawesi
Published 2024“…Using the cosine similarity algorithm for knowledge recommendation is village identified, utilizing community feedback as the foundation. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Recursive Subspace Identification Algorithm Using The Propagator Based Method
Published 2017“…In this paper, the recursive subspace identification algorithm based on the propagator method which avoids the SVD computation is proposed. …”
Get full text
Get full text
Get full text
Article -
13
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…In addition, a proof of concept is constructed to validate the proposed multi-factor Kerberos authentication using Java programming language. …”
Get full text
Get full text
Thesis -
14
Smoothed functional algorithm with norm-limited update vector for identification of continuous-time fractional-order Hammerstein Models
Published 2024“…In particular, the standard smoothed functional algorithm (SFA) based method is modified by implementing a limit function in the update vector of the standard SFA based method to solve the issue of high tendency of divergence during the identification process. …”
Get full text
Get full text
Get full text
Article -
15
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…System identification is a method of determining a mathematical relation between variables and terms of a process based on observed input-output data. …”
Get full text
Get full text
Get full text
Article -
16
Control of grain drying process using self-tuning quantitative feedback theory
Published 2011“…Tests results showed the superiority of QFT-based controller over PID controller tuned by both methods in terms of faster settling time, smaller percentage of overshoot and smaller control effort. …”
Get full text
Get full text
Thesis -
17
Identification of power poles based on satellite stereo images using graph-cut algorithm
Published 2015“…The method is based on Graph-Cut algorithm which applied on satellite stereo images. …”
Get full text
Get full text
Conference or Workshop Item -
18
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…iii The summarizing strategies identification module relies on a set of heuristic rules, statistical and linguistic methods such as position-based method, title-based method, cue-phrase method and word-frequency method to identify the summarizing strategies employed by students. …”
Get full text
Get full text
Thesis -
19
-
20
Hybrid DE and PEM algorithm for identification of small scale Autonomous helicopter model
Published 2012“…The proposed hybrid identification method explored the evolutionary search optimization strength of DE for parameter initialization for PEM identification algorithm…”
Get full text
Get full text
Monograph
