Search Results - (( rule extraction mead algorithm ) OR ( based observational system algorithm ))
Search alternatives:
- observational system »
- system algorithm »
- rule extraction »
- extraction mead »
- mead algorithm »
-
1
Observer-based fault detection with fuzzy variable gains and its application to industrial servo system
Published 2020“…The proposed fault detection algorithm employs a fuzzy logic-based approach with the objective of finding the appropriate observer gains that could cope with the different working conditions. …”
Get full text
Get full text
Get full text
Article -
2
Power Stabilization Of A Stand-Alone Solar System Using Perturb and Observe MPPT Algorithm
Published 2010“…This paper presents the method of power stabilization of a stand-alone solar system using perturb and observe (P&O) maximum power point algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
3
Power improvement of solar photovoltaic (PV) based on maximum power point tracking (MPPT) controller / Siti Munirah Ahmad Saad
Published 2018“…This MPPT using perturb and observe algorithm, the algorithm are general algorithm and use as a code. …”
Get full text
Get full text
Get full text
Thesis -
4
Optimal Placement of Phasor Measurement Unit (PMU) using genetic algorithm & cuckoo search algorithm
Published 2025“…The algorithms are assessed using key performance metrics, including the Bus Observability Index (BOI) and the System Observability Redundancy Index (SORI). …”
Get full text
Get full text
Get full text
Proceeding Paper -
5
Module integrated MPPT converter for photovoltaic / Muhammad Nur Al Hafiz Mohamad Husaini
Published 2020“…To implement module integrated perturb and observe MPPT algorithm into photovoltaic system to solve PV mismatch losses application. …”
Get full text
Get full text
Student Project -
6
Improving the efficiency of thermoelectric generator using perturb and observe MPPT algorithm
Published 2024“…The results demonstrate that the P&O algorithm effective increases the efficiency of MPPT in TEG systems. …”
Get full text
Get full text
Get full text
Article -
7
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…System identification is a method of determining a mathematical relation between variables and terms of a process based on observed input-output data. …”
Get full text
Get full text
Get full text
Article -
8
A genetic algorithm based student attendance management system with biometric identification / Mohammad Hanif Rashid
Published 2014“…We have incorporated Generic Algorithm (GA) in one stage of the system. The importance of using the Genetic Algorithm is to find the best fingerprints after going through all processes of selection, cross-over and mutation. …”
Get full text
Get full text
Thesis -
9
Solar photovoltaic system based on perturb and observe maximum power point tracking with trapezoidal rule approach under partial shading conditions
Published 2022“…Among all proposed algorithms, perturb and observe (P&O) algorithm is the most popular due to its simplicity and good convergence. …”
Get full text
Get full text
Get full text
Thesis -
10
Investigating the Performance of Deep Reinforcement Learning-Based MPPT Algorithm under Partial Shading Condition
Published 2024“…In this study, MATLAB models of a DRL-based MPPT algorithm were developed, tested, and compared to simulation based on two established MPPT algorithms-the Particle Swarm Optimization (PSO), and the Perturb and Observe (P&O). …”
Conference Paper -
11
Hybrid Improved Bacterial Swarm Optimization Algorithm for Hand-Based Multimodal Biometric Authentication System
Published 2019“…This paper proposes a Hybrid Improved Bacterial Swarm (HIBS) optimization algorithm for the minimization of Equal Error Rate (EER) as a performance measure in a hand-based multimodal biometric authentication system. …”
Get full text
Get full text
Article -
12
Identification of continuous-time hammerstein system using sine cosine algorithm
Published 2019“…This paper presents the development of identification of continuous-time Hammerstein systems based on Sine Cosine Algorithm (SCA). Here, the structure of the nonlinear subsystem is assumed to be unknown, while the structure of the linear subsystem which is the system order assumed to be available. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Regionalization by fuzzy expert system based approach optimized by genetic algorithm.
Published 2013“…Genetic algorithm (GA) was employed to adjust parameters of FES and optimize the system. …”
Get full text
Get full text
Article -
14
Observer-based fault detection approach using fuzzy adaptive poles placement system with real-time implementation
Published 2021“…This paper validated the system simulation by implementing fault detection algorithms by using a real-time embedded observer-based system. …”
Get full text
Get full text
Article -
15
Algorithm of the longest commonly consecutive word for plagiarism detection in text based document
Published 2008“…Based on the experiment, the proposed algorithm outperforms the suffix tree in the length of observed paragraph below one hundred words.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
Get full text
Get full text
Get full text
Article -
17
Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions
Published 2016“…In this work, the perturb and observation (P&O) method based on duty cycle adjustment is introduced, which is modified to increase speed of the search and also to reduce the oscillation.The simulation and experimental works have been performed to investigate behavior and performance of the proposed algorithm. …”
Get full text
Get full text
Thesis -
18
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…This research investigated a discriminant analysis method for detecting intrusions based on number of system calls during an activity on host machine. …”
Get full text
Get full text
Thesis -
19
Modified least trimmed squares method for face recognition / Nur Azimah Abdul Rahim
Published 2018“…In the proposed algorithm, the contaminated observations are distinguished in C-steps as every observation will be assigned a weight based on a cutoff value which will give a zero weight for any observations with residual error greater than the cutoff value and a weight "one" (1) otherwise. …”
Get full text
Get full text
Thesis -
20
Binary search algorithm-based maximum power point tracking for photovoltaic system under partial shaded conditions
Published 2018“…This paper presents the study on the application of Binary Search Algorithm (BSA) to determine the maximum power point under partially shaded photovoltaic system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
