Search Results - (( java application using algorithm ) OR ( based identification search algorithm ))
Search alternatives:
- identification search »
- based identification »
- java application »
- using algorithm »
-
1
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The recommendation services provided reduce users burden from manual browsing and searching for knowledge reference resources. KSFaci is embedded in web environment and is implemented using Java Servlet and runs under Apache server. …”
Get full text
Get full text
Thesis -
2
Simultaneous Computation of Model Order and Parameter Estimation for System Identification Based on Gravitational Search Algorithm
Published 2015“…In this paper, a technique termed as Simultaneous Model Order and Parameter Estimation (SMOPE), which is specifically based on Gravitational Search Algorithm (GSA) is proposed to combine model order selection and parameter estimation in one process. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
-
4
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…A deterministic mutation-based algorithm is introduced to overcome this problem. …”
Get full text
Get full text
Get full text
Article -
5
Effective predicate identification algorithm for XML retrieval
Published 2018“…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
Get full text
Get full text
Conference or Workshop Item -
6
Hybrid DE and PEM algorithm for identification of small scale Autonomous helicopter model
Published 2012“…The proposed hybrid identification method explored the evolutionary search optimization strength of DE for parameter initialization for PEM identification algorithm…”
Get full text
Get full text
Monograph -
7
Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat
Published 2008“…Consequently, another algorithm for maximum loadability identification using EP optimization technique was also developed. …”
Get full text
Get full text
Thesis -
8
Linear-pso with binary search algorithm for DNA motif discovery / Hazaruddin Harun
Published 2015“…The Linear-PSO algorithm was the first version of improvement. However due to the longer time required for complete execution of this algorithm, the Binary Search technique was integrated and a new version of the algorithm was developed, namely the Linear-PSO with Binary Search (LPBS) algorithm. …”
Get full text
Get full text
Thesis -
9
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
Get full text
Get full text
Final Year Project -
10
Opposition- based simulated kalman filters and their application in system identification
Published 2017“…From literature, Opposition-based Learning (OBL) has been employed to increase the diversity (exploration) of search algorithm by allowing current population to be compared with an opposite population. …”
Get full text
Get full text
Thesis -
11
Linear-PSO with binary search algorithm for DNA Motif Discovery / Hazaruddin Harun
Published 2015Get full text
Get full text
Book Section -
12
Comparative database search engine analysis on massive tandem mass spectra of pork-based food products for halal proteomics
Published 2021“…These software include open-source or commercial-based search engines; wherein, they employ different algorithms to establish their scoring and identified proteins. …”
Get full text
Get full text
Article -
13
Identification of continuous-time model of hammerstein system using modified multi-verse optimizer
Published 2021“…In particular, the search capacity of the MVO algorithm has been improved using the sine and cosine functions of the Sine Cosine Algorithm (SCA) that will be able to balance the processes of exploration and exploitation. …”
Get full text
Get full text
Thesis -
14
Hub Angle Control for A Single Link Flexible Manipulator Based on Cuckoo Search Algorithm
Published 2021“…Initially, the system was modelled using input and output experimental data of the hub angle. System identification was implemented via swarm intelligence algorithm known as cuckoo search algorithms based on auto regressive with exogenous model structure. …”
Get full text
Get full text
Get full text
Proceeding -
15
Thermoelectric cooler identification based on continuous-time hammerstein model using metaheuristics algorithm
Published 2021“…This paper presents the identification of the Thermoelectric Cooler (TEC) plant using a novel metaheuristic called hybrid Multi-Verse Optimizer with Sine Cosine Algorithm (hMVOSCA) based continuous-time Hammerstein model. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
Get full text
Get full text
Get full text
Thesis -
17
Simultaneous Computation of Model Order and Parameter Estimation of a Heating System Based on Gravitational Search Algorithm for Autoregressive with Exogenous Inputs
Published 2015“…Model order selection and parameter estimation are two significant aspects of determining the mathematical model for system identification. In this paper, an approach termed as Simultaneous Model Order and Parameter Estimation (SMOPE), which is basically based on Gravitational Search Algorithm (GSA), is proposed to combine these two parts into a simultaneous solution. …”
Get full text
Get full text
Get full text
Article -
18
A prototype for context identification of scientific papers via agent-based text mining
Published 2023Conference Paper -
19
-
20
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project
