Search Results - (( java application clustering algorithm ) OR ( data identification method algorithm ))
Search alternatives:
- application clustering »
- identification method »
- data identification »
- java application »
- method algorithm »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
2
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…The prototypes will be developed using JAVA language united with a MySQL database. Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
Get full text
Get full text
Final Year Project -
3
Recursive Subspace Identification Algorithm Using The Propagator Based Method
Published 2017“…Subspace model identification (SMI) method is the effective method in identifying dynamic state space linear multivariable systems and it can be obtained directly from the input and output data. …”
Get full text
Get full text
Get full text
Article -
4
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…System identification is a method of determining a mathematical relation between variables and terms of a process based on observed input-output data. …”
Get full text
Get full text
Get full text
Article -
5
Date store management in sliding window based on-line identification algorithms
Published 2001“…Sliding window identification algorithms use information from a store of data to optimise on-line learning. …”
Get full text
Get full text
Conference or Workshop Item -
6
-
7
Data mining based damage identification using imperialist competitive algorithm and artificial neural network
Published 2018“…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
Get full text
Get full text
Article -
8
Evapotranspiration prediction using system identification and genetic algorithm
Published 2012Get full text
Working Paper -
9
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
System identification using Extended Kalman Filter
Published 2017“…Besides, Extended Kalman Filter (EKF) algorithm was selected in this project as an algorithm for offline estimation data purposes. …”
Get full text
Get full text
Student Project -
11
A web-based implementation of k-means algorithms
Published 2022“…Firstly, k-luster could incorporate additional clustering algorithms, or even classification algorithms in the future. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification
Published 2007“…The genetic algorithm approach is widely recognized as an effective and flexible optimization method for system identification. …”
Get full text
Get full text
Article -
13
Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification
Published 2007“…he genetic algorithm approach is widely recognized as an effective and flexible optimization method for system identification. …”
Get full text
Get full text
Article -
14
Biometric identification with limited data set
Published 2019Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
-
16
Comparison of algorithm Support Vector Machine and C4.5 for identification of pests and diseases in chili plants
Published 2019“…Information about chili pests is collected so that it becomes a database that can be used to identify disease pests using the data mining method. The use of data mining algorithms is expected to help in the identification of pests and diseases in chili plants. …”
Get full text
Get full text
Conference or Workshop Item -
17
Implementation of Evolutionary Algorithms to Parametric Identification of Gradient Flexible Plate Structure
Published 2023“…A square aluminium plate experimental rig with a gradient of 30° and all edges clamped were designed and fabricated to acquire input-output vibration data experimentally. This input-output data was then applied in a system identification method, which used an evolutionary algorithm with a linear autoregressive with exogenous (ARX) model structure to generate a dynamic model of the system. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Implementation of Evolutionary Algorithms to Parametric Identification of Gradient Flexible Plate Structure
Published 2023“…A square aluminium plate experimental rig with a gradient of 30° and all edges clamped were designed and fabricated to acquire input-output vibration data experimentally. This input-output data was then applied in a system identification method, which used an evolutionary algorithm with a linear autoregressive with exogenous (ARX) model structure to generate a dynamic model of the system. …”
Get full text
Get full text
Get full text
Article -
19
Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification
Published 2007“…The genetic algorithm approach is widely recognized as an effective and flexible optimization method for system identification. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Improving the modeling capacity of Volterra model using evolutionary computing methods based on Kalman Smoother adaptive filter
Published 2015“…The applicability of the proposed methods is tested in three simulated data and one experimental data. …”
Get full text
Get full text
Article
