Search Results - (( panel estimation using algorithm ) OR ( user identification _ algorithm ))
Search alternatives:
- user identification »
- panel estimation »
- using algorithm »
-
1
Spacecraft sun-pointing using coplanar solar panels data and magnetic field measurements
Published 2013“…The proposed algorithm has been applied to EgyptSat-1. The satellite is switched from earth-pointing to sun-pointing mode using the estimated sun-vector. …”
Get full text
Get full text
Get full text
Proceeding Paper -
2
Robust estimation methods for fixed effect panel data model having block-concentrated outliers
Published 2019“…The Ordinary Least Squares (OLS) is the commonly used method to estimate the parameters of fixed effect panel data model. …”
Get full text
Get full text
Thesis -
3
Attitude and deformation coupled estimation of flexible satellite using low-cost sensors
Published 2022“…The numerical results also demonstrate that including the flexibility model in the developed estimation equations enables the algorithm to successfully estimate the deformation at any solar panel location without the need for any conventional sensor that directly measures the strain and/or deformation.…”
Get full text
Get full text
Article -
4
Implementation of a modified incremental conductance MPPT algorithm with direct control based on a fuzzy duty cycle change estimator using dSPACE
Published 2014“…A fuzzy logic estimator (FLE) is used to estimate the new duty cycle used to track the PV array maximum power point. …”
Get full text
Article -
5
Performance analyses of various photovoltaic power plant based on local spectral irradiances in Malaysia using genetic algorithm
Published 2023“…This project aims to measure the performances of various photovoltaic power plants in Malaysia based on local spectral irradiances using genetic algorithm. A Python computational model that uses genetic algorithms will be developed to estimate the optimal tilt angle and orientation angle as well as the solar power received for the solar sites. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Effective predicate identification algorithm for XML retrieval
Published 2018“…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
Get full text
Get full text
Conference or Workshop Item -
7
Modeling and analysis of the impact of information and communication technology on household consumption expenditure in different regions
Published 2022“…Based on the panel data of cities and towns in China, by using the generalized estimation method of a dynamic panel, through the construction of regional household consumption expenditure evaluation models, optimize the impact evaluation algorithm of household consumption expenditure in different regions, standardize critic indicators, and build the impact modeling of household consumption expenditure in combination with relevant algorithms such as the Engel coefficient. …”
Get full text
Get full text
Article -
8
Analysis of Online Social Network Connections for Identification of Influential Users
Published 2018“…This article presents a detailed survey of influential users’ identification algorithms and their performance evaluation approaches in OSNs. …”
Get full text
Get full text
Article -
9
-
10
-
11
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
Get full text
Get full text
Get full text
Thesis -
12
Development of person identification application for video surveillance
Published 2022“…The information of the tracker is necessary for person identification. Third, person identification implemented the CNN model for training. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Identifying the influential spreaders in multilayer interactions of online social networks
Published 2016“…The measurement results are found to be more reliable when the identification algorithms are applied to proposed topological representation compared when these algorithms are applied to single layer representations.…”
Get full text
Get full text
Article -
14
An efficient fuzzy clustering algorithm for mining user session clusters on web log data
Published 2021“…Because there are so many end-user sessions and URL resources, the size of web user session data is enormous. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm
Published 2020“…Recently, several studies showed that the brain electrical activity or electroencephalogram (EEG) signals provide unique features that can be considered as user identification techniques. But, it is a challenging task where there are three important things must be addressed carefully in any EEG-based person identification. …”
Get full text
Get full text
Thesis -
16
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
Get full text
Get full text
Thesis -
17
Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model
Published 2001“…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
Get full text
Get full text
Get full text
Article -
18
Smart cards and the fingerprint: a framework for user identification and authentication
Published 2003“…As a result, the research proposed a framework for user identification and authentication in automatic-teller-machine (ATM) systems using fingerprints and smart cards as opposed to the PIN and magnetic-stripe cards.…”
Get full text
Get full text
Get full text
Article -
19
Analysis and evaluation of various aspects of solar radiation in the Palestinian territories
Published 2023“…These coefficients were calculated using both MATLAB's fitting tool and genetic algorithm. …”
Article -
20
DEVELOPMENT OF IRIS RECOGNITION SYSTEM
Published 2016“…This project implements an iris recognition algorithm as a biometric identification. There is a need for reliable and security identification since typical identification methods using identity cards, passwords, and user name possess threats to the security of an organization because of human error. …”
Get full text
Get full text
Final Year Project
