Search Results - (( data identification method algorithm ) OR ( variable generation based algorithm ))
Search alternatives:
- identification method »
- data identification »
- variable generation »
- method algorithm »
- generation based »
-
1
Damage visualization based on frequency shift of single-mode ultrasound-guided wavefield
Published 2022“…Last but not least, the comparison of accuracy between frequency analysis algorithm and variable time window amplitude mapping (VTWAM) algorithm is performed. …”
Get full text
Get full text
Article -
2
Modeling of cupping suction system based on system identification method
Published 2022“…Cupping suction plant identification utilizing a nonlinear model based on the modified Sine Cosine Algorithm (mSCA). …”
Get full text
Get full text
Undergraduates Project Papers -
3
Seismic wave modeling and high-resolution imaging
Published 2022“…Dip frequency filtering (DFF) is a quick and reliable method for preserving diffraction. To suppress data reflection, this algorithm works in the frequency domain by defining a slope filter with respect to dt/dx. …”
Get full text
Get full text
Book -
4
Developing dengue index through the integration of crowdsourcing approach (X-Waba)
Published 2018“…This research aims at improving the existing dengue indices by developing an algorithm that would use the variables affecting positively the vector’s lifecycle and monitoring them daily to generate an improved Dengue Index that would help forewarn on the high possibility of a dengue outbreak. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
Multi-sensor fusion and deep learning framework for automatic human activity detection and health monitoring using motion sensor data / Henry Friday Nweke
Published 2019“…Third, to propose orientation invariant based deep spare autoencoder methods for automatic complex activity identification to minimize orientation inconsistencies and learn adequate data patterns. …”
Get full text
Get full text
Get full text
Thesis -
6
Recursive Subspace Identification Algorithm Using The Propagator Based Method
Published 2017“…Subspace model identification (SMI) method is the effective method in identifying dynamic state space linear multivariable systems and it can be obtained directly from the input and output data. …”
Get full text
Get full text
Get full text
Article -
7
Adapting the Elitism on the Greedy Algorithm for Variable Strength Combinatorial Test Cases Generation
Published 2018“…This study presented the most recent variable interaction strength (VS) CT strategy using an enhanced variant in the greedy algorithm. …”
Get full text
Get full text
Get full text
Article -
8
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…System identification is a method of determining a mathematical relation between variables and terms of a process based on observed input-output data. …”
Get full text
Get full text
Get full text
Article -
9
Date store management in sliding window based on-line identification algorithms
Published 2001“…Sliding window identification algorithms use information from a store of data to optimise on-line learning. …”
Get full text
Get full text
Conference or Workshop Item -
10
Message based random variable length key encryption algorithm.
Published 2009“…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
Get full text
Get full text
Article -
11
Data mining based damage identification using imperialist competitive algorithm and artificial neural network
Published 2018“…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
Get full text
Get full text
Article -
12
Adopting A Particle Swarm-Based Test Generator Strategy For Variable-Strength And T-Way Testing
Published 2011“…This thesis presents the design and implementation of a new interaction test generation strategy, known as the Particle Swarm-based Test Generator (PSTG), for generating t-way and variable-strength test suites. …”
Get full text
Get full text
Thesis -
13
Evapotranspiration prediction using system identification and genetic algorithm
Published 2012Get full text
Working Paper -
14
System identification using Extended Kalman Filter
Published 2017“…Besides, Extended Kalman Filter (EKF) algorithm was selected in this project as an algorithm for offline estimation data purposes. …”
Get full text
Get full text
Student Project -
15
A variable combinatorial test suite strategy based on modified greedy algorithm
Published 2015“…This proposed will suggest a new CIT strategy based on a modified greedy algorithm (MGA) with addressing the supporting of variable strength interaction to generate a satisfactory test suite size.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
A firefly algorithm based hybrid method for structural topology optimization
Published 2020“…In this paper, a firefly algorithm based hybrid algorithm through retaining global convergence of firefly algorithm and ability to generate connected topologies of optimality criteria (OC) method is proposed as an alternative method to solve stress-based topology optimization problems. …”
Get full text
Get full text
Article -
17
Optimization of hydropower reservoir operation based on hedging policy using Jaya algorithm
Published 2023Article -
18
Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification
Published 2007“…The genetic algorithm approach is widely recognized as an effective and flexible optimization method for system identification. …”
Get full text
Get full text
Article -
19
Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification
Published 2007“…he genetic algorithm approach is widely recognized as an effective and flexible optimization method for system identification. …”
Get full text
Get full text
Article -
20
Biometric identification with limited data set
Published 2019Get full text
Get full text
Get full text
Get full text
Proceeding Paper
