Search Results - (( its verification method algorithm ) OR ( variable extractions method algorithm ))
Search alternatives:
- verification method »
- extractions method »
- its verification »
- method algorithm »
- variable »
-
1
Fuzzy logic-based hill climbing technique for photovoltaic maximum power point tracking converter
Published 2013“…Maximum power point tracking (MPPT) is of paramount importance to the system as it not only maximizes system efficiency but also minimizes the return of investment in the PV installation. The hill climbing algorithm is the most common method of MPPT due to its simplicity, ease of implementation, and good performance. …”
Get full text
Get full text
Thesis -
2
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
3
Stroke-to-stroke matching in on-line signature verification
Published 2010“…The aim of this research is to develop a new approach to map the strokes in both test and reference signatures as well as to verify the originality of the test signatures. Current methods make use of the DTW algorithm and its variant to segment them before comparing each of its data dimension. …”
Get full text
Get full text
Thesis -
4
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…The result shows that PCA can improve the accuracy of the verification system by reduce the data down into its basic component without much loss of the information…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
-
6
Evaluation and Comparative Analysis of Feature Extraction Methods on Image Data to increase the Accuracy of Classification Algorithms
Published 2024“…The feature extraction methods evaluated were Grayscale Pixel Values, Mean Pixel Value of Channels, and Extracting Edge Features. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Coronary artery stenosis detection and visualization / Tang Sze Ling
Published 2015“…The proposed method benchmarked with the state-of-the-art methods and achieved comparable results. …”
Get full text
Get full text
Thesis -
8
Optimizing timber transportation planning for timber harvesting using bees algorithm in Malaysia
Published 2023“…A Bees Algorithm (BA) was proposed to find an optimum TTP for timber extraction, forest road, and landing locations with grid cell-sized 10 m × 10 m and attributed with fixed and variable costs. …”
Get full text
Get full text
Article -
9
Multi road marking detection system for autonomous car using hybrid- based method
Published 2018“…Wu dataset that consist of 1208 road images, which were extracted from videos recorded around California, the proposed algorithm performed satisfactorily. …”
Get full text
Get full text
Get full text
Thesis -
10
-
11
Enhanced face recognition using discrete cosine transform
Published 2016“…Appearance based techniques were also exploited for comparison with the new method, and results show that ‘ASDCT’ outperformed many renowned algorithms in the literature. …”
Get full text
Get full text
Get full text
Article -
12
Dosimetric verification of monaco treatment planning system (TPS) in heterogeneous medium for 6 mv linac
Published 2024“…Future efforts should aim to improve verification methods, address challenges in gamma index analysis, and enhance VMAT dose calculation accuracy for consistent treatment planning.…”
Get full text
Get full text
Thesis -
13
Continuation power flow for voltage stability assessment / Mohd Zamri Laton
Published 2006“…This thesis presents a potential algorithm for continuation power flow in order to find a power flow solution at its bifurcation point. …”
Get full text
Get full text
Thesis -
14
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…The joint-scalar is important in applications related to digital signature verification, such as elliptic curve digital signature algorithm and El Gamal signature scheme. …”
Get full text
Get full text
Thesis -
15
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…The results are used to develop the hybrid learning algorithm based on the AdaBoost, Bagging, and RUSBoost methods to predict the damage in the tower based on dynamic frequency domain. …”
Get full text
Get full text
Thesis -
16
Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging
Published 2016“…Performance evaluations based on hit rate and byte hit rate for the new method over conventional methods with real data will be conducted for validation and verification…”
Get full text
Get full text
Get full text
Article -
17
Application of Krylov Subspace methods for solving Continuous Power Flow problem in voltage stability analysis of power system
Published 2010“…Furthermore, the real data with 293 buses and 595 lines is used as a practical system for verification of the new algorithms The results show that these new algorithms are able to eliminate the convergence problem faced by the existing CPF algorithm. …”
Get full text
Get full text
Thesis -
18
-
19
-
20
A novel theoretical and practical methodology for extracting the parameters of the single and double diode Photovoltaic models
Published 2022“…However, there is no method to date that can guarantee the extracted parameter of the PV model is the most accurate one. …”
Get full text
Get full text
Article
