Search Results - (( model evaluation case algorithm ) OR ( _ identification based algorithm ))

Refine Results
  1. 1

    Identification of non-linear dynamic systems using fuzzy system with constrained membership functions by Yaakob, Mohd. Shafiek

    Published 2004
    “…In this study, the identification performance of the SFS trained by the back-propagation (BP) algorithm forms the basis of comparison when evaluations were made on the performance of the newly proposed CFS models. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Opposition- based simulated kalman filters and their application in system identification by Kamil Zakwan, Mohd Azmi

    Published 2017
    “…The overall performance is evaluated based on six case studies. According to the experimental results, COOBSKF provides average of maximum model validation up to 90%. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…After evaluating the results of these algorithms, a hybrid Artificial Neural Network-based Imperial Competitive Algorithm (ANN-ICA) was presented in the deployment step of the proposed methodology to identify the structural damage of illustrative structures. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…It involves development of Max-Min Rule-Based Classification Algorithm. The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Kalman filter based impedance parameter estimation for transmission line and distribution line by Siti Nur Aishah, Mohd Amin

    Published 2019
    “…Most of the current algorithms for parameter identification are based on the assumption that transmission line is fully transposed and the corresponding components are symmetric. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A voting-based hybrid machine learning approach for fraudulent financial data classification / Kuldeep Kaur Ragbir Singh by Kuldeep Kaur , Ragbir Singh

    Published 2019
    “…To evaluate the efficacy of the models, publicly available financial and credit card data sets are evaluated. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Object detection in aerial images using Convolutional Neural Network (CNN) / Wan Nur Alya Athirah Wan Roshdee by Wan Roshdee, Wan Nur Alya Athirah

    Published 2024
    “…The article that related to this study were identified and described based on the chosen algorithm, objectives, problems, and the significance. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Online system identification development based on recursive weighted least square neural networks of nonlinear hammerstein and wiener models. by Kwad, Ayad Mahmood

    Published 2022
    “…Best Hammerstein parallel NN polynomial based model and series-parallel NN polynomial model are 88.75% and 93.9% respectively, for best Hammerstein parallel NN sigmoid based model and series-parallel NN sigmoid based model 78.26% and 95.95% respectively, and for best Hammerstein parallel NN hyperbolic tangent based model and series-parallel NN hyperbolic tangent based model 70.7% and 96.4% respectively. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Automatic detection and indication of pallet-level tagging from rfid readings using machine learning algorithms by Choong, Chun Sern

    Published 2020
    “…Furthermore, the efficacy of different models based on heuristic hyperparameter tuning is evaluated in which the different kernel function for Support Vector Machine, various distance metrics of k-Nearest Neighbors. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A study on model-free approach for liquid slosh suppression based on stochastic approximation by Ahmad, Mohd Ashraf

    “…Then, the proposed model-free PID based SPSA is applied to the developed model. …”
    Get full text
    Get full text
    Research Report
  11. 11

    Development of data-driven controller for slosh suppression in liquid cargo vehicles by Mohd Falfazli, Mat Jusof, Ahmad, Mohd Ashraf, Raja Ismail, R. M.T., Suid, Mohd Helmi, Saari, Mohd Mawardi

    “…For the past decades, various control strategies of liquid slosh motion are based on model-based control schemes. Nevertheless, these methods are difficult to apply in practice. …”
    Get full text
    Get full text
    Research Report
  12. 12

    Development of a simulation-based decision support model for high precision component manufacturer by Gan, Sin Yi

    Published 2013
    “…The SDSM is useful to calculate the waiting cost which is too complicated if modelled by mathematical modeling or algorithms. By incorporating the Activity Based Costing (ABC) system into the simulation model, the costing for customer orders is greatly improved. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Development of reliability-centered maintenance model using linguistic failure mode and effect analysis by Mohammed Ahmed Qaid, Alrifaey Moath

    Published 2019
    “…After the proposed maintenance plan execution, the proposed RCM model have shown sufficient effectiveness in reliability and unavailability with real cost reduction, saved by 38.7% for the case study of electrical generator based on the application of the proposed RCM model. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Zero distortion-based steganography for handwritten signature by Iranmanesh, Vahab

    Published 2018
    “…Thus, developing a steganographic algorithm to use cover media (c) without raising attention is the most challenging task in data hiding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Recursive Subspace Identification Algorithm Using The Propagator Based Method by Jamaludin, Irma Wani, Abdul Wahab, Norhaliza

    Published 2017
    “…In this paper, the recursive subspace identification algorithm based on the propagator method which avoids the SVD computation is proposed. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Hybrid Artificial Bees Colony algorithms for optimizing carbon nanotubes characteristics by Mohammad Jarrah, Mu'ath Ibrahim

    Published 2018
    “…Chemical Vapor Deposition (CVD) is the most efficient method for CNTs production.However,using CVD method encounters crucial issues such as customization,time and cost.Therefore,Response Surface Methodology (RSM) is proposed for modeling and the ABC-βHC is proposed for optimization purpose to address such issues.The selected CNTs characteristics are CNTs yield and quality represented by the ratio of the relative intensity of the D and G-bands (ID/IG).Six case studies are generated from collected dataset including four cases of CNTs yield and one case of ID/IG as single objective optimization problems,while the sixth case represents multi-objective problem.The input parameters of each case are a subset from the set of input parameters including reaction temperature,duration,carbon dioxide flow rate,methane partial pressure,catalyst loading,polymer weight and catalyst weight.The models for the first three case studies were mentioned in the original work.RSM is proposed to develop polynomial models for the output responses in the other three cases and to identi significant process parameters and interactions that could affect the CNTs output responses.The developed models are validated using t-test,correlation and pattern matching.The predictive results have a good agreement with the actual experimental data.The models are used as objective functions in optimization techniques.For multi-objective optimization,this study proposes Desirability Function Approach (DFA) to be integrated with other proposed algorithms to form hybrid techniques namely RSM-DFA,ABC-DFA and ABC-βHC-DFA.The proposed algorithms and other selected well-known algorithms are evaluated and compared on their CNTs yield and quality.The optimization results reveal that ABC-βHC and ABC-βHC-DFA obtained significant results in terms of success rate,required time,iterations,and function evaluations number compared to other well-known algorithms.Significantly,the optimization results from this study are better than the results from the original work of the collected dataset.…”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Hybrid DE-PEM algorithm for identification of UAV helicopter by Tijani, Ismaila, Akmeliawati, Rini, Legowo, Ari, Budiyono, Agus, Abdul Muthalif, Asan Gani

    Published 2014
    “…Practical implications – The identification algorithm is expected to facilitate the required model development for model-based control design for autonomous helicopter development. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Smoothed functional algorithm with norm-limited update vector for identification of continuous-time fractional-order Hammerstein Models by Mok, Ren Hao, Mohd Ashraf, Ahmad

    Published 2024
    “…In particular, the standard smoothed functional algorithm (SFA) based method is modified by implementing a limit function in the update vector of the standard SFA based method to solve the issue of high tendency of divergence during the identification process. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Unifying the evaluation criteria of many objectives optimization using fuzzy Delphi method by Mohammed, Rawia Tahrir, Yaakob, Razali, Mohd Sharef, Nurfadhlina, Abdullah, Rusli

    Published 2021
    “…Lastly, the most suitable criteria outcomes are formulated in the unifying model and evaluate by experts to verify the appropriateness and suitability of the model in assessing the MaOO algorithms fairly and effectively.…”
    Get full text
    Get full text
    Article
  20. 20

    Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification by Abd Samad, Md Fahmi

    Published 2011
    “…A deterministic mutation-based algorithm is introduced to overcome this problem. …”
    Get full text
    Get full text
    Get full text
    Article