Search Results - (( data identification method algorithm ) OR ( based constructive method algorithm ))
Search alternatives:
- identification method »
- data identification »
- based constructive »
- method algorithm »
-
1
A novel single parent mating technique in genetic algorithm for discrete - time system identification
Published 2024“…System identification is concerned with the construction of a mathematical model based on given input and output data to represent the dynamical behaviour of a system. …”
Get full text
Get full text
Get full text
Article -
2
Parametric system identification and active vibration control of vibrational structures using genetic algorithm
Published 2007“…The aim of this research is to develop an Auto Regressive with eXogenous Input (ARX) model characterizing the dynamic behaviour of a two-dimensional (2D) flexible plate structure and the development of active vibration control (AVC) strategies for the structures. In order to construct the model, several sets of vibration data were obtained from the simulation of the flexible plate structures based on finite difference method. …”
Get full text
Get full text
Thesis -
3
PSO and Linear LS for parameter estimation of NARMAX/NARMA/NARX models for non-linear data / Siti Muniroh Abdullah
Published 2017“…Due to its stochastic nature, the algorithm does not inherit the numerical problems posed by the LLS algorithms. …”
Get full text
Get full text
Thesis -
4
Fault Detection and Identification in Quadrotor System (Quadrotor Robot)
Published 2016“…The aim of the research is to construct and design a Fault Detection and Isolation algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri
Published 2025“…This study addresses the urgent issue of detecting hidden defects in semiconductor wafers that conventional methods overlook. This work presents a novel graph-based semi-supervised learning (GSSL) algorithm designed for wafer defect detection. …”
Get full text
Get full text
Get full text
Thesis -
6
GA optimization-based BRB AI reasoning algorithm for determining the factors affecting customer churn for operators
Published 2024“…In the era of big data, numerous predictive models are based on more redundant features, which increases the complexity of the algorithms and the difficulty of analyzing customer churn. …”
Get full text
Get full text
Get full text
Article -
7
Complex word identification model for lexical simplification in the Malay language for non-native speakers
Published 2023“…This model is constructed based on the development of the CWI model outlined by the previous researcher. …”
Get full text
Get full text
Get full text
Thesis -
8
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…The final choice combines a feature-based and correlation-based approach. The thesis proposes a novel method of allowing users access after authenticating them by their fingerprints. …”
Get full text
Get full text
Thesis -
9
An optimized ensemble for predicting reservoir rock properties in petroleum industry
Published 2013“…The first method isbased on fuzzy genetic algorithm to overcome the premature convergence. …”
Get full text
Get full text
Thesis -
10
Fault Detection and Isolation for Complex System
Published 2017“…The aim of the research is to construct and design a Fault Detection and Isolation algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Database encryption for a Web-based Claims System
Published 2008“…This process is to be followed by the designing the Data Flow Diagram and then the Database. The former specifies how the data will flow in the system, whereas the latter is for data storage where all data are kept such as login identifications, passwords, staff personal particulars, entitlements etc. …”
Get full text
Thesis -
12
Identification and analysis of hoisting safety risk factors for IBS construction based on the AcciMap and cases study
Published 2024“…Finally, we used AcciMap technology to construct a qualitative IBS hoisting management model, which exhaustively presents the systematic levels and propagation paths of the influencing factors by the PDCA method. …”
Get full text
Get full text
Get full text
Article -
13
Review of deep convolution neural network in image classification
Published 2017“…Then, the research status and development trend of convolution neural network model based on deep learning in image classification are reviewed, which is mainly introduced from the aspects of typical network structure construction, training method and performance. …”
Get full text
Get full text
Get full text
Article -
14
Correlation analysis and predictive performance based on KNN and decision tree with augmented reality for nuclear primary cooling process / Ahmad Azhari Mohamad Nor
Published 2024“…Subsequently, predictive models employing k-nearest neighbour and decision tree algorithms are constructed and evaluated based on accuracy, precision, and recall metrics. …”
Get full text
Get full text
Thesis -
15
Nonlinear dynamic system identification and control via self-regulating modular neural network
Published 2003“…A parametric control at epoch terminations and performance based on local incremental experts insertions are incorporated. …”
Get full text
Get full text
Article -
16
Stress mental health symptom assessment mobile application for young adults
Published 2023“…As for the panic attack prediction feature, the application will transmit user-input responses to a model previously trained using historical data. Before this stage, the KNN algorithm is employed to construct the model using Google Form response data as part of the application development process. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
-
18
Recursive Subspace Identification Algorithm Using The Propagator Based Method
Published 2017“…Subspace model identification (SMI) method is the effective method in identifying dynamic state space linear multivariable systems and it can be obtained directly from the input and output data. …”
Get full text
Get full text
Get full text
Article -
19
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The evaluation of the security of the proposed scheme is based on SVO logic to verify the security of the informal method. …”
Get full text
Get full text
Thesis -
20
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…System identification is a method of determining a mathematical relation between variables and terms of a process based on observed input-output data. …”
Get full text
Get full text
Get full text
Article
