Search Results - (( its verification method algorithm ) OR ( variable extractions method algorithm ))

Refine Results
  1. 1

    Fuzzy logic-based hill climbing technique for photovoltaic maximum power point tracking converter by Taghvaee, Mohammad Hossein

    Published 2013
    “…Maximum power point tracking (MPPT) is of paramount importance to the system as it not only maximizes system efficiency but also minimizes the return of investment in the PV installation. The hill climbing algorithm is the most common method of MPPT due to its simplicity, ease of implementation, and good performance. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin by Shamsudin, Farah Syadiyah

    Published 2017
    “…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Stroke-to-stroke matching in on-line signature verification by Ahmad Jaini, Azhar

    Published 2010
    “…The aim of this research is to develop a new approach to map the strokes in both test and reference signatures as well as to verify the originality of the test signatures. Current methods make use of the DTW algorithm and its variant to segment them before comparing each of its data dimension. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching by Ei Wei., Ting, M. Z., Ibrahim, D.J., Mulvaney

    Published 2017
    “…The result shows that PCA can improve the accuracy of the verification system by reduce the data down into its basic component without much loss of the information…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6
  7. 7

    Coronary artery stenosis detection and visualization / Tang Sze Ling by Tang, Sze Ling

    Published 2015
    “…The proposed method benchmarked with the state-of-the-art methods and achieved comparable results. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Optimizing timber transportation planning for timber harvesting using bees algorithm in Malaysia by Jamaluddin, Jamhuri, Kamarudin, Norizah, Ismail, Mohd Hasmadi, Ahmad, Siti Azfanizam

    Published 2023
    “…A Bees Algorithm (BA) was proposed to find an optimum TTP for timber extraction, forest road, and landing locations with grid cell-sized 10 m × 10 m and attributed with fixed and variable costs. …”
    Get full text
    Get full text
    Article
  9. 9

    Multi road marking detection system for autonomous car using hybrid- based method by Shah, Khan Bahadur

    Published 2018
    “…Wu dataset that consist of 1208 road images, which were extracted from videos recorded around California, the proposed algorithm performed satisfactorily. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Enhanced face recognition using discrete cosine transform by Fatma Susilawati, Mohamad, Mustafa, Mamat, Zahraddeen, Sufyanu

    Published 2016
    “…Appearance based techniques were also exploited for comparison with the new method, and results show that ‘ASDCT’ outperformed many renowned algorithms in the literature. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Dosimetric verification of monaco treatment planning system (TPS) in heterogeneous medium for 6 mv linac by Azlan, Adriana Batrisyia Noor Mohd

    Published 2024
    “…Future efforts should aim to improve verification methods, address challenges in gamma index analysis, and enhance VMAT dose calculation accuracy for consistent treatment planning.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Continuation power flow for voltage stability assessment / Mohd Zamri Laton by Laton, Mohd Zamri

    Published 2006
    “…This thesis presents a potential algorithm for continuation power flow in order to find a power flow solution at its bifurcation point. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Multi-base number representation in application to scalar multiplication and pairing computation by Mohammed Ismail, Abdelwahed

    Published 2011
    “…The joint-scalar is important in applications related to digital signature verification, such as elliptic curve digital signature algorithm and El Gamal signature scheme. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower by Gatea, Sarah Jabbar

    Published 2018
    “…The results are used to develop the hybrid learning algorithm based on the AdaBoost, Bagging, and RUSBoost methods to predict the damage in the tower based on dynamic frequency domain. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging by Olanrewaju, Rashidah Funke, Al-Qudah, Dua'a Mahmoud Mohammad, Azman, Amelia Wong, Yaacob, Mashkuri

    Published 2016
    “…Performance evaluations based on hit rate and byte hit rate for the new method over conventional methods with real data will be conducted for validation and verification…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Application of Krylov Subspace methods for solving Continuous Power Flow problem in voltage stability analysis of power system by Jasni, Jasronita

    Published 2010
    “…Furthermore, the real data with 293 buses and 595 lines is used as a practical system for verification of the new algorithms The results show that these new algorithms are able to eliminate the convergence problem faced by the existing CPF algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20