Search Results - (( re evaluation metric algorithm ) OR ( based identification using algorithm ))
Search alternatives:
- based identification »
- identification using »
- evaluation metric »
- metric algorithm »
- using algorithm »
- re evaluation »
-
1
Performance evaluation metrics for multi-objective evolutionary algorithms in search-based software engineering: systematic literature review
Published 2021“…To evaluate such performance, it is necessary to consider a number of performance metrics that play important roles during the evaluation and comparison of investigated algorithms based on their best-simulated results. …”
Get full text
Get full text
Article -
2
State-Aware re-configuration model for multi-radio wireless Mesh Networks
Published 2017“…The ns-2 simulator is used as simulation tool and various metrics are evaluated. These metrics include channel-link utilization, channel re-assignment cost, re-routing cost, throughput, and delay. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
3
Disparity Refinement Process Based On Ransac Plane Fitting For Machine Vision Applications
Published 2017“…The performance evaluations are based on standard image quality metrics i.e. structural similarity index measure, peak signal-to-noise ratio and mean square error.…”
Get full text
Get full text
Get full text
Get full text
Article -
4
-
5
Hybrid DE-PEM algorithm for identification of UAV helicopter
Published 2014“…Design/methodology/approach – In this study, flight data were collected and analyzed; MATLAB-based system identification algorithm was developed using DE and PEM; parameterized state-space model parameters were estimated using the developed algorithm and model dynamic analysis. …”
Get full text
Get full text
Get full text
Article -
6
Weather prediction system using ANN algorithm / Nur Afiqah Ahmad Sukri
Published 2024“…The ANN model consists of three layers with ReLU and softmax activations and is trained using the backpropagation algorithm. …”
Get full text
Get full text
Thesis -
7
Identification of continuous-time hammerstein system using sine cosine algorithm
Published 2019“…This paper presents the development of identification of continuous-time Hammerstein systems based on Sine Cosine Algorithm (SCA). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Thermoelectric cooler identification based on continuous-time hammerstein model using metaheuristics algorithm
Published 2021“…This paper presents the identification of the Thermoelectric Cooler (TEC) plant using a novel metaheuristic called hybrid Multi-Verse Optimizer with Sine Cosine Algorithm (hMVOSCA) based continuous-time Hammerstein model. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
-
10
Identification of power poles based on satellite stereo images using graph-cut algorithm
Published 2015“…In conclusion, based on the results, Our proposed Graph-Cut algorithm produces more accurate disparity maps than the existing matching algorithm used for disparity calculation.…”
Get full text
Get full text
Conference or Workshop Item -
11
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…A deterministic mutation-based algorithm is introduced to overcome this problem. …”
Get full text
Get full text
Get full text
Article -
12
Software regression test case prioritization for object-oriented programs using genetic algorithm with reduced-fitness severity
Published 2015“…A sample test suite is used to evaluate the performance of our proposed approach. …”
Get full text
Get full text
Conference or Workshop Item -
13
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…It involves the process of re-testing software after modifications. Ideally, to perform regression testing is to re-execute all the test cases on the modified software. …”
Get full text
Get full text
Thesis -
14
Date store management in sliding window based on-line identification algorithms
Published 2001Get full text
Get full text
Conference or Workshop Item -
15
Data mining based damage identification using imperialist competitive algorithm and artificial neural network
Published 2018“…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
Get full text
Get full text
Article -
16
Hybrid-discrete multi-objective particle swarm optimization for multi-objective job-shop scheduling
Published 2022“…It is also discovered that the hybrid-discrete MOPSO (HD-MOPSO) algorithm manages to obtain higher values in the performance metrics consisting of non-dominance ratio and hypervolume compared to the competing algorithms. …”
Get full text
Get full text
Get full text
Thesis -
17
Smoothed functional algorithm with norm-limited update vector for identification of continuous-time fractional-order Hammerstein Models
Published 2024“…This article proposes an identification method of continuous-time fractional-order Hammerstein model using smoothed functional algorithm with a norm-limited update vector (NL-SFA). …”
Get full text
Get full text
Get full text
Article -
18
Identification of the thermoelectric cooler using hybrid multi-verse optimizer and sine cosine algorithm based continuous-time Hammerstein model
Published 2021“…This paper presents the identification of the ThermoElectric Cooler (TEC) plant using a hybrid method of Multi-Verse Optimizer with Sine Cosine Algorithm (hMVOSCA) based on continuous-time Hammerstein model. …”
Get full text
Get full text
Get full text
Article -
19
Hybrid metaheuristic method for clustering in wireless sensor networks / Bryan Raj Peter Jabaraj
Published 2023“…Moreover, two improvised clustering techniques are introduced to reduce the energy overhead cost from the re-clustering process. The performance of aHSSOGA is evaluated based on average residual energy, network lifetime, total re-clustering occurrence, total data delivery, network throughput and end-to-end delay metrics. …”
Get full text
Get full text
Get full text
Thesis -
20
Iterative closed-loop identification of MIMO systems using ARX-based Leaky Least Mean Square Algorithm
Published 2014Get full text
Get full text
Conference or Workshop Item
