Search Results - (( parameter evaluation method algorithm ) OR ( storage extraction method algorithm ))

Refine Results
  1. 1

    Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms by Ridha, Hussein Mohammed

    Published 2020
    “…However, the main drawbacks of this system are the high capital investment and low energy efficiency mainly due to the simple PV model and the ineffective sizing method of SAPV system. Therefore, precisely modeling method to determine the unknown parameters of the PV module is essential to give a realistic evaluation for the extracted energy of the PV array. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A fingerprint matching algorithm using bit-plane extraction method with phase-only correlation by Florence, Francis-Lothai, Bong, David B L

    Published 2017
    “…This paper introduces a new method in fingerprint feature extraction based on bit-plane. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    A fast feature extraction algorithm for image and video processing by Abdulhussain, Sadiq H., Ramli, Abdul Rahman, Mahmmod, Basheera M., Saripan, M. Iqbal, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Baker, Thar, Flayyih, Wameedh Nazar, Jassim, Wissam A.

    Published 2019
    “…We compared the proposed method with the traditional approach of feature extraction using a standard image technique. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Taguchi-Grey Relational Analysis Method for Parameter Tuning of Multi-objective Pareto Ant Colony System Algorithm by Muthana, Shatha Abdulhadi, Ku Mahamud, Ku Ruhana

    Published 2023
    “…The gray relational grade (GRG) performance metric and the Friedman test were used to evaluate the algorithm’s performance. The Taguchi-GRA method that produced the new values for the algorithm’s parameters was shown to be able to provide a better multi-objective generator maintenance scheduling (GMS) solution. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Evaluation of lightning current parameters using measured lightning induced voltage on distribution power lines by Izadi, Mahdi, Ab Kadir, Mohd Zainal Abidin, Osman, Miszaina

    Published 2019
    “…In this paper, an algorithm had been proposed to evaluate the lightning current parameters using measured voltage from overhead distribution lines based on lightning location obtained from lightning location system. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Inversed Control Parameter in Whale Optimization Algorithm and Grey Wolf Optimizer for Wrapper-Based Feature Selection: A Comparative Study by Li Yu Yab, Li Yu Yab, Wahid, Noorhaniza, A Hamid, Rahayu

    Published 2023
    “…This comparative study aims to investigate and compare the effectiveness of the inversed control parameter in the proposed methods against the original algorithms in terms of the number of selected features and the classification accuracy. …”
    Get full text
    Get full text
    Article
  9. 9

    Inversed Control Parameter in Whale Optimization Algorithm and Grey Wolf Optimizer for Wrapper-Based Feature Selection: A Comparative Study by Li Yu Yab, Li Yu Yab, Wahid, Noorhaniza, A Hamid, Rahayu

    Published 2023
    “…This comparative study aims to investigate and compare the effectiveness of the inversed control parameter in the proposed methods against the original algorithms in terms of the number of selected features and the classification accuracy. …”
    Get full text
    Get full text
    Article
  10. 10

    A New Bit-Plane Extraction Approach for Fingerprint Recognition Using Phase-Only Correlation Function by Florence, Francis Lothai

    Published 2016
    “…POC based recognition method is adopted because of its simplicity and ability to achieve high accuracy compared to other recognition algorithms, especially for low quality fingerprint image. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments by Abdulhussain, Sadiq H.

    Published 2018
    “…The performance of the proposed algorithm is compared to that of several state-of-the-art TVS algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Evaluation of Lightning Current Using Inverse Procedure Algorithm. by Ab Kadir, Mohd Zainal Abidin, Izadi, Mahdi, Askari, Mohamad Tolou, Hajikhani, Maryam

    Published 2013
    “…The proposed method considers on all electromagnetic fields components and can evaluate full shape of current, velocity and constant parameters of current models in contrast with previous studies. …”
    Get full text
    Get full text
    Article
  13. 13

    The evaluation of content-oriented XML document retrieval: a case study of FTMSK official letter / Hayati Abdul Rahman by Abdul Rahman, Hayati

    Published 2006
    “…The inverted file method has been used for the indexing techniques to develop the indexing algorithm of the FTMSK official letter. …”
    Get full text
    Get full text
    Research Reports
  14. 14

    Tree-based contrast subspace mining method by Florence Sia Fui Sze

    Published 2020
    “…Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    CORROSION DAMAGE ANALYSIS USING IMAGE PROCESSING by DEMPI, CHRISTIE BANGI

    Published 2018
    “…NDE is an automatic detection method for corrosion classification which can be implemented for the inspection of the pipelines and storage tanks in the oil and gas industry as it will not disturb their properties and performance.…”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Evaluating power efficient algorithms for efficiency and carbon emissions in cloud data centers: a review by Uddin, Mueen, Darabidarabkhani, Yasaman, Shah, Asadullah, Memon, Jamshed

    Published 2015
    “…The three algorithms are evaluated for performance using three parameters; power efficiency, cost effectiveness, and amount of CO2 emissions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid by Yazid, Mariam Azwa

    Published 2015
    “…Cryptography has been proven to be the best method to secure a database. However there are many types of cryptography algorithm that has been established in the market. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Parameters optimization of surface grinding process with particles swarm optimization, gravitational search, and sine cosine algorithms: a comparative analysis by Asrul, Adam

    Published 2018
    “…The efficiency of the three algorithms are evaluated and compared with previous results obtained by other optimization methods on similar studies. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item