Search Results - (( data identification method algorithm ) OR ( based constructive method algorithm ))

Refine Results
  1. 1

    A novel single parent mating technique in genetic algorithm for discrete - time system identification by Abd Samad @ Mahmood, Md Fahmi, Zainuddin, Farah Ayiesya, Jamaluddin, Hishamuddin, Azad, Abul K. M.

    Published 2024
    “…System identification is concerned with the construction of a mathematical model based on given input and output data to represent the dynamical behaviour of a system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Parametric system identification and active vibration control of vibrational structures using genetic algorithm by Mohammad Sofi @ Aziz, Azfi Zaihan

    Published 2007
    “…The aim of this research is to develop an Auto Regressive with eXogenous Input (ARX) model characterizing the dynamic behaviour of a two-dimensional (2D) flexible plate structure and the development of active vibration control (AVC) strategies for the structures. In order to construct the model, several sets of vibration data were obtained from the simulation of the flexible plate structures based on finite difference method. …”
    Get full text
    Get full text
    Thesis
  3. 3

    PSO and Linear LS for parameter estimation of NARMAX/NARMA/NARX models for non-linear data / Siti Muniroh Abdullah by Abdullah, Siti Muniroh

    Published 2017
    “…Due to its stochastic nature, the algorithm does not inherit the numerical problems posed by the LLS algorithms. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Fault Detection and Identification in Quadrotor System (Quadrotor Robot) by Chan, Shi Jing, Pebrianti, Dwi

    Published 2016
    “…The aim of the research is to construct and design a Fault Detection and Isolation algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri by Pedram , Tabatabaeemoshiri

    Published 2025
    “…This study addresses the urgent issue of detecting hidden defects in semiconductor wafers that conventional methods overlook. This work presents a novel graph-based semi-supervised learning (GSSL) algorithm designed for wafer defect detection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    GA optimization-based BRB AI reasoning algorithm for determining the factors affecting customer churn for operators by Kun, Liu, Alli, Hassan, Abd Rahman, Khairul Aidil Azlin

    Published 2024
    “…In the era of big data, numerous predictive models are based on more redundant features, which increases the complexity of the algorithms and the difficulty of analyzing customer churn. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Complex word identification model for lexical simplification in the Malay language for non-native speakers by Salehah, Omar

    Published 2023
    “…This model is constructed based on the development of the CWI model outlined by the previous researcher. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Secure Access To Authorized Resources Based On Fingerprint Authentication by Elmadani, Ahmed Baba

    Published 2003
    “…The final choice combines a feature-based and correlation-based approach. The thesis proposes a novel method of allowing users access after authenticating them by their fingerprints. …”
    Get full text
    Get full text
    Thesis
  9. 9

    An optimized ensemble for predicting reservoir rock properties in petroleum industry by Kenari, Seyed Ali Jafari

    Published 2013
    “…The first method isbased on fuzzy genetic algorithm to overcome the premature convergence. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Fault Detection and Isolation for Complex System by Chan, Shi Jing, Bayuaji, Luhur, Rosdiyana, Samad, Mahfuzah, Mustafa, Nor Rul Hasma, Abdullah, Zainah, Md. Zain, Pebrianti, Dwi

    Published 2017
    “…The aim of the research is to construct and design a Fault Detection and Isolation algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Database encryption for a Web-based Claims System by Syed Zulkarnain Syed Idrus

    Published 2008
    “…This process is to be followed by the designing the Data Flow Diagram and then the Database. The former specifies how the data will flow in the system, whereas the latter is for data storage where all data are kept such as login identifications, passwords, staff personal particulars, entitlements etc. …”
    Get full text
    Thesis
  12. 12

    Identification and analysis of hoisting safety risk factors for IBS construction based on the AcciMap and cases study by Junjia, Yin, Alias, Aidi Hizami, Haron, Nuzul Azam, Abu Bakar, Nabilah

    Published 2024
    “…Finally, we used AcciMap technology to construct a qualitative IBS hoisting management model, which exhaustively presents the systematic levels and propagation paths of the influencing factors by the PDCA method. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Review of deep convolution neural network in image classification by Al-Saffar, Ahmed Ali Mohammed, Tao, Hai, Mohammed, Ahmed Talab

    Published 2017
    “…Then, the research status and development trend of convolution neural network model based on deep learning in image classification are reviewed, which is mainly introduced from the aspects of typical network structure construction, training method and performance. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Correlation analysis and predictive performance based on KNN and decision tree with augmented reality for nuclear primary cooling process / Ahmad Azhari Mohamad Nor by Mohamad Nor, Ahmad Azhari

    Published 2024
    “…Subsequently, predictive models employing k-nearest neighbour and decision tree algorithms are constructed and evaluated based on accuracy, precision, and recall metrics. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Nonlinear dynamic system identification and control via self-regulating modular neural network by Kiong, L.C., Rajeswari, M., Rao, M.V.C.

    Published 2003
    “…A parametric control at epoch terminations and performance based on local incremental experts insertions are incorporated. …”
    Get full text
    Get full text
    Article
  16. 16

    Stress mental health symptom assessment mobile application for young adults by Lee, Chun Hoong

    Published 2023
    “…As for the panic attack prediction feature, the application will transmit user-input responses to a model previously trained using historical data. Before this stage, the KNN algorithm is employed to construct the model using Google Form response data as part of the application development process. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17
  18. 18

    Recursive Subspace Identification Algorithm Using The Propagator Based Method by Jamaludin, Irma Wani, Abdul Wahab, Norhaliza

    Published 2017
    “…Subspace model identification (SMI) method is the effective method in identifying dynamic state space linear multivariable systems and it can be obtained directly from the input and output data. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The evaluation of the security of the proposed scheme is based on SVO logic to verify the security of the informal method. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification by Abd Samad, Md Fahmi

    Published 2011
    “…System identification is a method of determining a mathematical relation between variables and terms of a process based on observed input-output data. …”
    Get full text
    Get full text
    Get full text
    Article