Search Results - (( data optimization methods algorithm ) OR ( _ verification using algorithm ))*
Search alternatives:
- optimization methods »
- verification using »
- data optimization »
- methods algorithm »
- using algorithm »
- _ verification »
-
1
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…Two additional sites from T&C of the FiT scheme were used for the verification of the new developed FD algorithm. …”
Get full text
Get full text
Thesis -
2
Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging
Published 2016“…However, their performances are not well optimized. This work proposes a hybrid method that optimize cache replacement algorithm using Naïve Bayes (NB) based approach. …”
Get full text
Get full text
Get full text
Article -
3
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
Get full text
Get full text
Thesis -
4
Secured dynamic request scheduling and optimal CSP selection for analyzing cloud service performance using intelligent approaches
Published 2023“…Five phases—Data User (DS) authentication, sensitivity-aware request scheduling, policy verification, trust management, and optimal CSP selection—are proposed. …”
Get full text
Get full text
Get full text
Article -
5
An enhanced motion planning method for industrial robots based on the digital twin concept
Published 2025“…By integrating an improved Artificial potential field method, A* algorithm, and a synergistic approach combining 3-5-3 polynomial interpolation with particle swarm optimization, we effectively address the challenges of dynamic obstacle avoidance and trajectory optimization. …”
Get full text
Get full text
Thesis -
6
A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors
Published 2008“…An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
Get full text
Thesis -
7
A fictitious reference iterative tuning method for buck converter-powered DC motor control system
Published 2019“…This paper presents a model-free optimization algorithm for a PID controller based on Fictitious Reference Iterative Tuning and Simulated Kalman Filter. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
-
9
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
10
VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern
Published 2012“…These two models are based on topological placement method. DM is optimized using genetic algorithm (GA). …”
Get full text
Get full text
Thesis -
11
Data-driven continuous-time Hammerstein modeling with missing data using improved Archimedes optimization algorithm
Published 2024“…This research introduces the improved Archimedes optimization algorithm (IAOA) for data-driven modeling of continuous-time Hammerstein models with missing data. …”
Get full text
Get full text
Get full text
Article -
12
Integration Of Fingerprint Centre Point Location And Principal Component Analysis For Fingerprint Verification
Published 2005“…This Paper Presents An Efficient Algorithm For Estimating The Location Of The Centre Point (Cp) Of A Fingerprint For The Purpose Of Aligning Fingerprints In A Fingerprint Verification System. …”
Get full text
Get full text
Get full text
Article -
13
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
Get full text
Get full text
Thesis -
14
-
15
Application of Optimization Methods for Solving Clustering and Classification Problems
Published 2011“…In this study we show how to apply a particular class of optimization methods known as pattern search methods to address these challenges. …”
Get full text
Get full text
Thesis -
16
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…In order to solve it, Bat Algorithm method is implement in to optimization method in fuzzy modeling for classification. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
17
Data-Driven control based on marine predators algorithm for optimal tuning of the wind plant
Published 2022“…Comparative results alongside other existing metaheuristic-based algorithms further confirmed excellence of the proposed method through its superior performance against the slime mould algorithm (SMA), multi-verse optimizer (MVO), sine-cosine algorithm (SCA), grey wolf optimizer (GWO), and safe experimentation dynamics (SED) algorithm.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Algorithmic Loan Risk Prediction Method Based on PSO-EBGWO-Catboost
Published 2024“…PSO-EBGWO is used to optimize the parameters of the CatBoost model. In this method, the Gray Wolf optimized algorithm (EBGWO) is further optimized by particle swarm optimization (PSO), and when combined with it, the convergence performance of the model is improved, the parameters of the model are reduced, and the model is simplified. …”
Get full text
Get full text
Get full text
Article -
19
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…The Speeded-Up Robust Features (SURF) Algorithms is used to determine the interest points. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Data clustering using the bees algorithm
Published 2007“…The authors’ team have developed a new population based search algorithm called the Bees Algorithm that is capable of locating near optimal solutions efficiently. …”
Get full text
Get full text
Conference or Workshop Item
