Search Results - (( course evaluation path algorithm ) OR ( between transformational system algorithm ))
Search alternatives:
- transformational system »
- course evaluation »
- system algorithm »
- evaluation path »
- path algorithm »
-
1
Artificial neural networks and genetic algorithm for transformer winding/insulation faults
Published 2008“…The results are compared between the real and predicted faults to observe the accuracy rate of the system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
-
3
Transformer T-joint optimization using particle swarm optimization and hemisphere-shape design of the core
Published 2017“…The electrical power engineering and transformer experts seek to achieve the best economic and practical operation of electrical power system transformers, which include minimizing losses that are generated inside the transformers. …”
Get full text
Get full text
Thesis -
4
Black hole algorithm along edge detector and circular hough transform based iris projection with biometric identification systems
Published 2024“…In this study, we presented a Black Hole Algorithm (BHA) along the Canny edge detector and circular Hough transform-based optimization technique for circular parameter identification of iris segmentation. …”
Get full text
Get full text
Article -
5
APPLICATION OF ANN AND GA FOR TRANSFORMER WINDING/ INSULATION FAULTS
Published 2007“…The project outcome is analyzed using Neural Network and Genetic Algorithm MATLAB Toolbox. Comparison between the real fault and predicted fault is made as to observe the accuracy rate of the system. …”
Get full text
Get full text
Final Year Project -
6
Data mining techniques for transformer failure prediction model: A systematic literature review
Published 2023Conference Paper -
7
Shape matching and object recognition using dissimilarity measures with Hungarian algorithm
Published 2009Get full text
Working Paper -
8
An FPGA implementation and performance analysis between radix-2 and radix-4 of 4096 point FFT
Published 2018“…The main block in any OFDM transceiver is the Fast Fourier Transform (FFT). FFT consider the transformation bridge between the time and frequency domains. …”
Get full text
Get full text
Conference or Workshop Item -
9
Correlation immunity and resiliency of boolean functions from haar domain perspective
Published 2015“…The paper exploits the analogy between the two transforms to derive the Haar general representation of the correlation-immunity and the resiliency security criteria. …”
Get full text
Get full text
Get full text
Article -
10
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
11
Analysis Of Sift And Surf Algorithms For Image Mosaicing On Embedded Platform
Published 2015“…Next homography estimation is performed by using RANSAC algorithm. Perspective transform is applied to obtain a transformation for mapping a two dimensional quadrilateral into another. …”
Get full text
Get full text
Thesis -
12
COMPUTER AIDED SYSTEM FOR BREAST CANCER DIAGNOSIS USING CURVELET TRANSFORM
Published 2011“…In this thesis we developed a computer aided system for the diagnosis and detection of breast cancer using curvelet transform. …”
Get full text
Get full text
Thesis -
13
Verification of correctness properties for aggregation behavior of swarm robotics system using spin model checker / Siti Shafinaz Ali
Published 2015“…This algorithm is based on PFSA only relies on local interactions between individuals, the extensibility of the algorithm is very weak. …”
Get full text
Get full text
Thesis -
14
Verification correctness properties for aggregation behavior of swarm robotics system using SPIN model checker / Siti Shafinaz Ali
Published 2015“…This algorithm is based on PFSA only relies on local interactions between individuals, the extensibility of the algorithm is very weak. …”
Get full text
Get full text
Thesis -
15
The haar analysis of nonlinearity cryptographic security criterion
Published 2016“…This paper presents an analysis of the nonlinearity criterion from the Haar transform domain perspective. The paper proceeds by utilizing the connection between the Haar and the Walsh transforms. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Model predictive control of bidirectional isolated DC–DC converter for energy conversion system
Published 2015“…Model predictive control (MPC) is a powerful and emerging control algorithm in the field of power converters and energy conversion systems. …”
Get full text
Get full text
Get full text
Article -
17
Loss minimization in load flow simulation in power system
Published 2009Get full text
Learning Object -
18
Eccentricity Optimization of NGB System by using Multi-Objective Genetic Algorithm
Published 2009“…In this study, a new method for designing a particular braced system by using multi-objective genetic algorithm is proposed. …”
Get full text
Get full text
Article -
19
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
Published 2012“…In the field of Data Communication, security issues are the top priority.Cryptography and steganography address the necessary elements for secure communication namely privacy, confidentiality,key exchange,authentication,and non-repudiation but reveals the fact that communication is happening.This study proposes a combination of Steganography and Cryptography to enhance security of the transmitted information.Hence this work is composed of two parts:cryptographic and steganographic.In the cryptographic part,an improvement has been proposed to the Hill cipher algorithm to be more secured by using a large and random key with large data block,and also extending it by including the special characters and digits.For the steganographic part,a new method has been proposed by combining Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT),to take the advantageous of both algorithms.The original image is decomposed into four bands using the Haar wavelet LL,HL,LH and HH.Three of these sub-bands have been selected to hiding data (LH,HL and HH)which are less effect to the image than LL sub-band.Then,DCT transform is applied to the selected DWT sub-band,the process of hiding will be in the least significant bit of the DCT coefficients to each sub-band. …”
Get full text
Get full text
Undergraduates Project Papers -
20
3D coordinate transformation using molodensky badekas transformation model: MBT07
Published 2007“…Transformations between coordinate systems are routinely carried out in surveying. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
