Search Results - (( parameter extraction means algorithm ) OR ( data protection means algorithm ))

Refine Results
  1. 1

    Spatiotemporal extraction of aquaculture ponds under complex surface conditions based on deep learning and remote sensing indices by Qin, Weirong, Ismail, Mohd Hasmadi, Ramli, Mohammad Firuz, Deng, Junlin, Wu, Ning

    Published 2025
    “…This study provides a potential means for long-term observation and tracking of changes in aquaculture ponds and water surfaces, as well as water management and water protection. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation by Ahmadipour, Masoud

    Published 2019
    “…Then, by means of the Slantlet Transform theory, the matrix data extraction for any decomposition level are computed and the best of them are selected as input data to feed to an effective classifier. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Machine-learning-based adaptive distance protection relay to eliminate zone-3 protection under-reach problem on statcom-compensated transmission lines by Aker, Elhadi Emhemed Alhaaj Ammar

    Published 2020
    “…This current study proposes an intelligent data mining approach for the Machine Learning- Adaptive Distance Relay (ML-ADR) fault classification model using novel extracted 1-cycle transient voltage and current signals hidden knowledge from both healthy and faulty lines parameters. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Parameters extraction of double diode photovoltaic module's model based on hybrid evolutionary algorithm by Muhsen D.H., Ghazali A.B., Khatib T., Abed I.A.

    Published 2023
    “…Algorithms; Diodes; Errors; Extraction; Iterative methods; Mean square error; Optimization; Parameter estimation; Parameter extraction; Photovoltaic cells; Differential evolution algorithms; Diode modeling; Electromagnetism-like algorithm; Fast convergence speed; Hybrid evolutionary algorithm; IV characteristics; Photovoltaic model; Root mean square errors; Evolutionary algorithms…”
    Article
  6. 6

    A comparative study of evolutionary algorithms and adapting control parameters for estimating the parameters of a single-diode photovoltaic module's model by Muhsen D.H., Ghazali A.B., Khatib T., Abed I.A.

    Published 2023
    “…Algorithms; Diodes; Errors; Iterative methods; Least squares approximations; Mean square error; Optimization; Parameter estimation; Parameter extraction; Photovoltaic cells; Coefficient of determination; Differential Evolution; Electromagnetism-like algorithm; Hybrid evolutionary algorithm; Photovoltaic; Photovoltaic modules; Root mean square errors; Single-diode models; Evolutionary algorithms; algorithm; comparative study; electromagnetic method; estimation method; experimental design; numerical method; parameterization; performance assessment; photovoltaic system…”
    Article
  7. 7

    Individual-tree segmentation and extraction based on LiDAR point cloud data by Liu, Xiaofeng, Abdullah, Muhamad Taufik, Mustaffa, Mas Rina, Nasharuddin, Nurul Amelina

    Published 2024
    “…The objective was to identify the optimal parameters for both algorithms in terms of tree height extraction precision. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    Cryptographic Algorithm Using Matrix Inversion as Data Protection by Zirra, Peter B., Wajiga, G.M.

    Published 2011
    “…The algorithms were tested with samples of real data and the result practically demonstrated how systems of non-linear equations turned into linear equations are indeed of relevance in providing strong and complex encryption and decryption keys to protect sensitive information in store or in transit via unsecure channels. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Modeling of vehicle trajectory using K-means and fuzzy C-means clustering by Choong, Mei Yeen, Lorita Angeline, Chin, Renee Ka Yin, Yeo, Kiam Beng, Teo, Kenneth Tze Kin

    Published 2019
    “…Hence, the clustering of vehicle trajectory dataset for similar patterns identification is implemented with k-means and fuzzy c-means (FCM) clustering algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  13. 13

    Using a novel algorithm in ultrasound images to detect renal stones by Sania Eskandari, Saeed Meshgini, Ali Farzamnia

    Published 2021
    “…The pre-processed image is taken as input for the segmentation process. Fuzzy C-means, K-means, and Expectation–Maximization algorithms are used to segment the renal calculi from the kidney ultrasound image; further region parameters are extracted from the segmented region. …”
    Get full text
    Get full text
    Get full text
    Proceedings
  14. 14

    Estimation Of Weibull Parameters Using Simulated Annealing As Applied In Financial Data by Hamza, Abubakar

    Published 2023
    “…Additionally, the two-parameter Weibull distribution has been extended by incorporating additional parameters to capture the uncertainty behaviour in the financial data.…”
    Get full text
    Get full text
    Thesis
  15. 15

    User authentication for mobile devices using motion sensors based on Moore’s neighborhood / Muhammad Asyraf Akop by Akop, Muhammad Asyraf

    Published 2017
    “…However, the smartphone also is a personal device which means it contains a lot of confidential data. Therefore it needs some kind of protection to avoid unauthorized access to the data inside. …”
    Get full text
    Get full text
    Student Project
  16. 16
  17. 17

    HEP-2 CELL IMAGES CLASSIFICATION BASED ON STATISTICAL TEXTURE ANALYSIS AND FUZZY LOGIC by Jamil, Nur Farahim

    Published 2014
    “…The algorithm gives a mean accuracy of 84% out of 125 test images.…”
    Get full text
    Get full text
    Final Year Project
  18. 18
  19. 19

    Perovskite lattice constant prediction framework using optimized artificial neural network and fuzzy logic models by metaheuristic algorithms by Bouzateur, Inas, Ouali, Mohammed Assam, Bennacer, Hamza, Ladjal, Mohamed, Khmaissia, Fadoua, Rahman, Mohd Amiruddin Abd, Boukortt, Abdelkader

    Published 2023
    “…In the first part, the study assessed, the effectiveness of various metaheuristic algorithms (PSO-IWO-ICA) in tuning the parameters of the ANN prediction structure in order to get the optimal parameter of the ANN. …”
    Get full text
    Get full text
    Article
  20. 20