Search Results - (( its verification method algorithm ) OR ( parameter evaluation method algorithm ))
Search alternatives:
- parameter evaluation »
- verification method »
- its verification »
- method algorithm »
-
1
-
2
Coastal Priority Ranking in Oil Spill Response Decision Support Mechanism
Published 2008“…The advantage of CPR scale method was its ability for a more dynamic quantitative evaluation of priorities in application time rather than only explaining sensitivity indices of area. …”
Get full text
Get full text
Thesis -
3
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
4
Modelling and calibration of high-pressure direct injection compressed natural gas engine
Published 2021“…A proper setting for the MBC procedure using the Genetic Algorithm (GA) needs to be identified. The objectives of the study are 1) to analyse the effect of HPDI-CNG system configuration and influential parameters, 2) to evaluate the injector mass flow rate and its suitability to fulfil engine requirement, 3) to assess the HPDI-CNG vehicle performance as a whole, and 4) to calibrate the electronic control unit (ECU) base maps by using MBC procedure. …”
Get full text
Get full text
Thesis -
5
Stroke-to-stroke matching in on-line signature verification
Published 2010“…The aim of this research is to develop a new approach to map the strokes in both test and reference signatures as well as to verify the originality of the test signatures. Current methods make use of the DTW algorithm and its variant to segment them before comparing each of its data dimension. …”
Get full text
Get full text
Thesis -
6
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…The result shows that PCA can improve the accuracy of the verification system by reduce the data down into its basic component without much loss of the information…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Modeling and Optimization of Tapered Rectangular Thin-walled Columns Subjected to Oblique Loading for Impact Energy Absorption
Published 2013“…There are two stages of research method adopted in this study. The initial stage was the developed and verification of the used finite element (FE) model. …”
Get full text
Get full text
Conference or Workshop Item -
8
-
9
Parameter extraction of photovoltaic module using hybrid evolutionary algorithm
Published 2023Conference Paper -
10
Taguchi-Grey Relational Analysis Method for Parameter Tuning of Multi-objective Pareto Ant Colony System Algorithm
Published 2023“…The gray relational grade (GRG) performance metric and the Friedman test were used to evaluate the algorithm’s performance. The Taguchi-GRA method that produced the new values for the algorithm’s parameters was shown to be able to provide a better multi-objective generator maintenance scheduling (GMS) solution. …”
Get full text
Get full text
Get full text
Article -
11
Evaluation of lightning current parameters using measured lightning induced voltage on distribution power lines
Published 2019“…In this paper, an algorithm had been proposed to evaluate the lightning current parameters using measured voltage from overhead distribution lines based on lightning location obtained from lightning location system. …”
Get full text
Get full text
Conference or Workshop Item -
12
Inversed Control Parameter in Whale Optimization Algorithm and Grey Wolf Optimizer for Wrapper-Based Feature Selection: A Comparative Study
Published 2023“…This comparative study aims to investigate and compare the effectiveness of the inversed control parameter in the proposed methods against the original algorithms in terms of the number of selected features and the classification accuracy. …”
Get full text
Get full text
Article -
13
Inversed Control Parameter in Whale Optimization Algorithm and Grey Wolf Optimizer for Wrapper-Based Feature Selection: A Comparative Study
Published 2023“…This comparative study aims to investigate and compare the effectiveness of the inversed control parameter in the proposed methods against the original algorithms in terms of the number of selected features and the classification accuracy. …”
Get full text
Get full text
Article -
14
Evaluation of Lightning Current Using Inverse Procedure Algorithm.
Published 2013“…The proposed method considers on all electromagnetic fields components and can evaluate full shape of current, velocity and constant parameters of current models in contrast with previous studies. …”
Get full text
Get full text
Article -
15
Tree-based contrast subspace mining method
Published 2020“…Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
Get full text
Get full text
Get full text
Thesis -
16
Enhanced face recognition using discrete cosine transform
Published 2016“…Appearance based techniques were also exploited for comparison with the new method, and results show that ‘ASDCT’ outperformed many renowned algorithms in the literature. …”
Get full text
Get full text
Get full text
Article -
17
Evaluation of lightning current parameters using measured lightning induced voltage on distribution power lines
Published 2023Conference Paper -
18
Fuzzy logic-based hill climbing technique for photovoltaic maximum power point tracking converter
Published 2013“…Further experimental setup was carried out for comparative evaluation and the MPPT algorithm was implemented to performance verification of the algorithm by using digital signal processor (TMS320F28335). …”
Get full text
Get full text
Thesis -
19
Evaluating power efficient algorithms for efficiency and carbon emissions in cloud data centers: a review
Published 2015“…The three algorithms are evaluated for performance using three parameters; power efficiency, cost effectiveness, and amount of CO2 emissions. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
20
Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid
Published 2015“…Cryptography has been proven to be the best method to secure a database. However there are many types of cryptography algorithm that has been established in the market. …”
Get full text
Get full text
Thesis
