Search Results - (( model validation methods algorithm ) OR ( based construction system algorithm ))*

Refine Results
  1. 1

    Development of a Negotiation Support Model for Value Management in Construction by UTOMO, CHRISTIONO

    Published 2009
    “…This methodology combines value analysis method using Function Analysis System Technique (FAST); Life Cycle Cost analysis, group decision analysis method based on Analytical Hierarchy Process (AHP), and Game theory-based agent system to develop a negotiation support. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    PSO and Linear LS for parameter estimation of NARMAX/NARMA/NARX models for non-linear data / Siti Muniroh Abdullah by Abdullah, Siti Muniroh

    Published 2017
    “…System Identification, a discipline for constructing models from dynamic systems, consist of three major steps: structure selection, parameter estimation and model validation. …”
    Get full text
    Get full text
    Thesis
  3. 3

    System identification and pid control of toothbrush simulator system by Mohd Yusoff, Ainul Husna

    Published 2019
    “…Genetic algorithm model based on model order 4 has been selected as the best model as it able to achieve the minimum MSE value of 0.0176 and past all the validation tests. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Parametric system identification and active vibration control of vibrational structures using genetic algorithm by Mohammad Sofi @ Aziz, Azfi Zaihan

    Published 2007
    “…In order to construct the model, several sets of vibration data were obtained from the simulation of the flexible plate structures based on finite difference method. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Application of system identification method coupled with evolutionary algorithms for the optimization of power consumption in a pem fuel cell propulsion system / Suhadiyana Hanapi by Hanapi, Suhadiyana

    Published 2018
    “…Secondly, in this research, an empirical dynamic model of the PEM fuel cell system in vehicles was analyzed and validated using the system identification method……”
    Get full text
    Get full text
    Book Section
  6. 6

    ECG encryption enhancement with multi-layers of AES and DNA computing by Kh-Madhloom, Jamal

    Published 2023
    “…In order to more effectively incorporate both present technology and developing technology, models of DNA cryptography need to be developed. MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    A hybrid approach for personalized news recommendation with ordered clustering algorithm, rich user and news metadata by Darvishy, Asghar

    Published 2019
    “…Commonly, the current news recommendation systems employ the collaborative filtering-based (CF-based), Content-based filtering (Content-based) or hybrid methods. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…The study on related work and comparison of algorithm also has been done in this phase. In Design phase, the use case diagram, whole system flowchart and subsystem flowchart has been constructed to assist the development of this web tool. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Development of a Negotiation Support Model for Value Management in Construction by Utomo, Christiono

    Published 2010
    “…This methodology combines value analysis method using Function Analysis System Technique (FAST); Life Cycle Cost analysis, group decision analysis method based on Analytical Hierarchy Process (AHP), and Game theory-based agent system to develop a negotiation support.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    A genetic algorithm based fuzzy inference system for pattern classification and rule extraction by Wong S.Y., Yap K.S., Li X.

    Published 2023
    “…This paper presents a genetic-algorithm-based fuzzy inference system for extracting highly comprehensible fuzzy rules to be implemented in human practices without detailed computation (hereafter denoted as GA-FIS). …”
    Article
  11. 11

    Time series modeling of water level at Sulaiman Station, Klang River, Malaysia by Galavi, Hadi

    Published 2010
    “…Using the cross validation method the best training subset is selected to train the ANFIS model based on that dataset. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Simulation-Based Power Estimation for High Throughput SHA-256 Design on Unfolding Transformation by Shamsiah, Suhaili, Norhuzaimin, Julai, Asrani, Lit, Maimun Binti, Huja Hussin, Mohamad Faizrizwan bin, Mohd Sabri

    Published 2022
    “…In constructing the SHA-256 algorithm, high speed, compact size, and low power consumption are all factors to be taken into account for an efficient implementation. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  13. 13

    A single measurement of combined Direct and indirect MPPT algorithm for mismatch PV module application / Mohd Najib Mohd Hussain by Mohd Hussain, Mohd Najib

    Published 2016
    “…The signal from the sensor is then applied for power switching devices of the PO buck-boost converter by the attained maximum power point current from CoDID MPPT method. The system is constructed from model-based design (MBD) of the PV system. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Efficient gear fault feature selection based on moth‑flame optimisation in discrete wavelet packet analysis domain by Ong, Pauline, Tieh, Tony Hieng Cai, Lai, Kee Huong, Lee, Woon Kiow, Ismon, Maznan

    Published 2019
    “…Lastly, the MFO-selected features were used as the input for a support vector machine (SVM) diagnostic model to identify fault patterns. To further demonstrate the superiority of the proposed method, other feature selection approaches were applied, including randomly selected features and complete features, and other diagnostic models, namely the multilayer perceptron neural network and k-nearest neighbour. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks by Wang Jie, Mohd. Kamal Mohd. Shah, Choong Wai Heng, Nahiyan Al-Azad

    Published 2024
    “…The study offers a guided approach for selecting BP neural network parameters, enhancing practicality. Simulations validate the method's effectiveness, indicating low workload and high reliability. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Load shedding scheme for islanded distribution network with flexible load selection and power changes / Ja’far Saifeddin Abdelhafiz Jallad by Ja’far Saifeddin , Abdelhafiz Jallad

    Published 2018
    “…Taking into account the time execution, the artificial neural network (ANN) model was constructed based on the daily load plots. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    A rough-fuzzy inference system for selecting team leader for software development teams by Jaafar, Jafreezal, Gilal, Abdul Rehman, Omar, Mazni, Basri, Shuib, Abdul Aziz, Izzatdin, Hasan, Mohd Hilmi

    Published 2017
    “…Decision rules were then used under Mamdani’s fuzzy inference method. At the end, the developed model was validated based on the results of prediction accuracy and F1-measures.…”
    Get full text
    Get full text
    Book Section
  18. 18

    A Rough-Fuzzy Inference System for Selecting Team Leader for Software Development Teams by Jaafar, J., Gilal, A.R., Omar, M., Basri, S., Aziz, I.A., Hasan, M.H.

    Published 2018
    “…Decision rules were then used under Mamdaniâ��s fuzzy inference method. At the end, the developed model was validated based on the results of prediction accuracy and F1-measures. …”
    Get full text
    Get full text
    Article
  19. 19

    A Rough-Fuzzy Inference System for Selecting Team Leader for Software Development Teams by Jaafar, J., Gilal, A.R., Omar, M., Basri, S., Aziz, I.A., Hasan, M.H.

    Published 2018
    “…Decision rules were then used under Mamdaniâ��s fuzzy inference method. At the end, the developed model was validated based on the results of prediction accuracy and F1-measures. …”
    Get full text
    Get full text
    Article
  20. 20

    Machine Learning based Predictive Modelling of Cybersecurity Threats Utilising Behavioural Data by Ting, Tin Tin, Khiew, Jie Xin, Ali Aitizaz, Lee, Kuok Tiung, Teoh, Chong Keat, Hasan Sarwar

    Published 2023
    “…The algorithms are used to construct, test, and validate three categories of cybercrime threat (Malware, Social Engineering, and Password Attack) predictive models. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article