Search Results - (( data identification method algorithm ) OR ( variable operations using algorithm ))*
Search alternatives:
- identification method »
- data identification »
- variable operations »
- method algorithm »
- operations using »
- using algorithm »
-
1
Development of fault detection, diagnosis and control system identification using multivariate statistical process control (MSPC)
Published 2006“…In this research work, an FDD algorithm is developed using MSPC and correlation coefficients between process variables. …”
Get full text
Get full text
Monograph -
2
Identification of heavy-flavour jets with the CMS detector in pp collisions at 13 TeV
Published 2018“…In this paper, the discriminating variables and the algorithms used for heavy-flavour jet identification during the first years of operation of the CMS experiment in proton-proton collisions at a centre-of-mass energy of 13 TeV, are presented. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
3
CAT CHAOTIC GENETIC ALGORITHM BASED TECHNIQUE AND HARDWARE PROTOTYPE FOR SHORT TERM ELECTRICAL LOAD FORECASTING
Published 2017“…The correlation analysis is used for the identification and selection of the most influential input variable vector (IVV). …”
Get full text
Get full text
Thesis -
4
Towards enhanced remaining useful life prediction of lithium-ion batteries with uncertainty using optimized deep learning algorithm
Published 2025“…The effectiveness of the proposed LSA + LSTM model is assessed using battery aging data from the NASA dataset. In addition, to validate the prediction performance of the proposed LSA + LSTM model, extensive comparisons are performed with other popular optimization-based deep learning methods including artificial bee colony (ABC) based LSTM (ABC + LSTM), gravitational search algorithm (GSA) based LSTM (GSA + LSTM), and particle swarm optimization (PSO) based LSTM (PSO + LSTM) model using different error matrices. …”
Article -
5
Feature Ranking Techniques For 3D ATS Drug Molecular Structure Identification
Published 2018“…The proposed feature selection approach has a simple algorithmic framework and makes use of the existing feature selection techniques to cater different variety of data issues, namely Ensemble Filter-Embedded Feature Ranking Approach (FEFR). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Faulty sensor detection mechanism using multi-variate sensors in IoT
Published 2019“…The first proposed method is a logical mechanism uses three different types of. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Oil palm female inflorescences anthesis stages identification using selected emissivities through thermal imaging and Machine Learning
Published 2022“…This research studies different Machine Learning (ML) classification and ensemble techniques for the assessment of the four pollination stages consist of pre-anthesis I, pre-anthesis II, pre-anthesis III, and anthesis using thermal imaging. Different ML algorithms such as Random Forest (RF), k Nearest Neighbor (kNN), Support Vector Machine (SVM), Artificial Neural Network (ANN) as well as an ensemble method are used on data extracted from thermal images collected during infield oil palms pollination stages monitoring. …”
Get full text
Get full text
Get full text
Thesis -
8
-
9
Recursive Subspace Identification Algorithm Using The Propagator Based Method
Published 2017“…Subspace model identification (SMI) method is the effective method in identifying dynamic state space linear multivariable systems and it can be obtained directly from the input and output data. …”
Get full text
Get full text
Get full text
Article -
10
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…System identification is a method of determining a mathematical relation between variables and terms of a process based on observed input-output data. …”
Get full text
Get full text
Get full text
Article -
11
Date store management in sliding window based on-line identification algorithms
Published 2001“…Sliding window identification algorithms use information from a store of data to optimise on-line learning. …”
Get full text
Get full text
Conference or Workshop Item -
12
Data mining based damage identification using imperialist competitive algorithm and artificial neural network
Published 2018“…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
Get full text
Get full text
Article -
13
Evapotranspiration prediction using system identification and genetic algorithm
Published 2012Get full text
Working Paper -
14
System identification using Extended Kalman Filter
Published 2017“…Besides, Extended Kalman Filter (EKF) algorithm was selected in this project as an algorithm for offline estimation data purposes. …”
Get full text
Get full text
Student Project -
15
-
16
Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification
Published 2007“…The genetic algorithm approach is widely recognized as an effective and flexible optimization method for system identification. …”
Get full text
Get full text
Article -
17
Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification
Published 2007“…he genetic algorithm approach is widely recognized as an effective and flexible optimization method for system identification. …”
Get full text
Get full text
Article -
18
Biometric identification with limited data set
Published 2019Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
Variable Global Optimization min-sum (VGOMS) algorithm of decode-and forward-protocol for the relay node in the cooperative channel
Published 2020“…The proposed VGOMS algorithm apply the optimization scaling factor at the bit node processing of the variable node operation which have significantly less complexity as compared with the check node operation or both variable node and check node operation. …”
Get full text
Get full text
Get full text
Article -
20
Comparison of algorithm Support Vector Machine and C4.5 for identification of pests and diseases in chili plants
Published 2019“…Information about chili pests is collected so that it becomes a database that can be used to identify disease pests using the data mining method. The use of data mining algorithms is expected to help in the identification of pests and diseases in chili plants. …”
Get full text
Get full text
Conference or Workshop Item
