Search Results - (( course evaluation a algorithm ) OR ( _ identification based algorithm ))
Search alternatives:
- identification based »
- course evaluation »
- _ identification »
- evaluation a »
- a algorithm »
-
1
Recursive Subspace Identification Algorithm Using The Propagator Based Method
Published 2017“…In this paper, the recursive subspace identification algorithm based on the propagator method which avoids the SVD computation is proposed. …”
Get full text
Get full text
Get full text
Article -
2
Using algorithmic taxonomy to evaluate lecturer workload
Published 2006“…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Get full text
Article -
3
Hybrid DE-PEM algorithm for identification of UAV helicopter
Published 2014“…Practical implications – The identification algorithm is expected to facilitate the required model development for model-based control design for autonomous helicopter development. …”
Get full text
Get full text
Get full text
Article -
4
Evaluate the performance of university course timetabling problem with different combinations of genetic algorithm
Published 2025“…University course timetabling problem (UCTP) is a scheduling problem that requires courses to be assigned to the limited time slots, classrooms, and lecturers, while adhering to a set of predefined constraints. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Smoothed functional algorithm with norm-limited update vector for identification of continuous-time fractional-order Hammerstein Models
Published 2024“…In particular, the standard smoothed functional algorithm (SFA) based method is modified by implementing a limit function in the update vector of the standard SFA based method to solve the issue of high tendency of divergence during the identification process. …”
Get full text
Get full text
Get full text
Article -
6
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…A deterministic mutation-based algorithm is introduced to overcome this problem. …”
Get full text
Get full text
Get full text
Article -
7
Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal
Published 2006“…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Conference or Workshop Item -
8
Identification of continuous-time hammerstein system using sine cosine algorithm
Published 2019“…This paper presents the development of identification of continuous-time Hammerstein systems based on Sine Cosine Algorithm (SCA). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Hybrid DE and PEM algorithm for identification of small scale Autonomous helicopter model
Published 2012“…A hybrid identification algorithm based on Differential Evolution (DE) and PEM is proposed in this study for effective identification of a small scale helicopter's model parameters. …”
Get full text
Get full text
Monograph -
10
Fsm-Based Enhanced March C- Algorithm For Memory Built-In Self-Test
Published 2017Get full text
Get full text
Thesis -
11
Thermoelectric cooler identification based on continuous-time hammerstein model using metaheuristics algorithm
Published 2021“…This paper presents the identification of the Thermoelectric Cooler (TEC) plant using a novel metaheuristic called hybrid Multi-Verse Optimizer with Sine Cosine Algorithm (hMVOSCA) based continuous-time Hammerstein model. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Statistical computing for forensic firearm pattern identification: Evaluating a fisher linear discriminant analysis-based algorithm against fixed-impulse noise
Published 2025“…Previous studies developed a Fisher Linear Discriminant Analysis (FLDA)-based ballistic identification algorithm to address this limitation, encompassing image pre-processing, feature extraction, and identification. …”
Get full text
Get full text
Get full text
Article -
13
Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal
Published 2006“…Lecturer workload at universities includes three major categories: teaching, research and services.Teaching workload is influence by various factors such as level taught courses, number of student, credit and contact hour and off campus or on campus course design.The UPM has a KM Portal that contains sets of metadata on lecturer profile and knowledge assets.The Lecturer profile contains information lecturer teaching, research, publication and many more.We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload.This method measures the lecturer teaching workload.The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset.Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Identification of power poles based on satellite stereo images using graph-cut algorithm
Published 2015“…In conclusion, based on the results, Our proposed Graph-Cut algorithm produces more accurate disparity maps than the existing matching algorithm used for disparity calculation.…”
Get full text
Get full text
Conference or Workshop Item -
15
Date store management in sliding window based on-line identification algorithms
Published 2001Get full text
Get full text
Conference or Workshop Item -
16
A Robust Firearm Identification Algorithm of Forensic Ballistics Specimens
Published 2017“…Therefore, the aim of this study is to propose a robust algorithm for a firearm identification based on extracting a set of informative features from the segmented region of interest (ROI) using the simulated noisy center-firing pin impression images. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Evaluate the performance of university timetabling problem with various artificial intelligence techniques
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Iterative closed-loop identification of MIMO systems using ARX-based Leaky Least Mean Square Algorithm
Published 2014Get full text
Get full text
Conference or Workshop Item -
19
-
20
Data mining based damage identification using imperialist competitive algorithm and artificial neural network
Published 2018“…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
Get full text
Get full text
Article
