Search Results - (( model validation research algorithm ) OR ( based construction based algorithm ))

Refine Results
  1. 1

    A self-adaptive agent-based simulation modelling framework for dynamic processes by Ling, Loo Yim, Dr.

    Published 2023
    “…Key parameters for dynamic processes of different domains were formulated for the construction of self-adaptive simulation algorithms and modelling. …”
    text::Thesis
  2. 2

    Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system by Maseer, Ziadoon Kamil

    Published 2022
    “…In this study, the Deep Belief Network algorithm was optimized and constructed to design an effective NIDS anomaly model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Development of a Negotiation Support Model for Value Management in Construction by UTOMO, CHRISTIONO

    Published 2009
    “…The research objectives are to find a theoretical basis and research approach for negotiation support methodology on VM, to develop a decision model for technical solution options in a satisfying function/cost preferences, to investigate negotiation style and outcome and analyze the correlation between them for the basis of scenarios on the agent system, to develop a model for agreement options and coalition algorithms on value-based decision, to validate the coalition algorithms and introduce an initial model of Negotiation Support for Value Management (NSVM). …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Agreement options for negotiation on material location decision of housing development by Utomo, C., Rahmawati, Y.

    Published 2020
    “…The objectives are to find a model for agreement options and coalition, to validate the algorithms of the best fit for material locations and to determine how much the proposed agreement option was achieved. …”
    Get full text
    Get full text
    Article
  5. 5

    Complex word identification model for lexical simplification in the Malay language for non-native speakers by Salehah, Omar

    Published 2023
    “…This model is constructed based on the development of the CWI model outlined by the previous researcher. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…The study on related work and comparison of algorithm also has been done in this phase. In Design phase, the use case diagram, whole system flowchart and subsystem flowchart has been constructed to assist the development of this web tool. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Development of a Negotiation Support Model for Value Management in Construction by Utomo, Christiono

    Published 2010
    “…The research objectives are to find a theoretical basis and research approach for negotiation support methodology on VM, to develop a decision model for technical solution options in a satisfying function/cost preferences, to investigate negotiation style and outcome and analyze the correlation between them for the basis of scenarios on the agent system, to develop a model for agreement options and coalition algorithms on value-based decision, to validate the coalition algorithms and introduce an initial model of Negotiation Support for Value Management (NSVM). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Application of system identification method coupled with evolutionary algorithms for the optimization of power consumption in a pem fuel cell propulsion system / Suhadiyana Hanapi by Hanapi, Suhadiyana

    Published 2018
    “…This thesis makes a number of key contributions to the advancement of fuel cell vehicle design within two main research areas; powertrain system design based on quality energy, and optimization system based on biology based algorithms. …”
    Get full text
    Get full text
    Book Section
  10. 10

    System identification and pid control of toothbrush simulator system by Mohd Yusoff, Ainul Husna

    Published 2019
    “…The brushing simulator remote control was created to control the desired speed through a smartphone. Genetic algorithm model based on model order 4 has been selected as the best model as it able to achieve the minimum MSE value of 0.0176 and past all the validation tests. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Simulation-Based Power Estimation for High Throughput SHA-256 Design on Unfolding Transformation by Shamsiah, Suhaili, Norhuzaimin, Julai, Asrani, Lit, Maimun Binti, Huja Hussin, Mohamad Faizrizwan bin, Mohd Sabri

    Published 2022
    “…In recent years, security has grown in importance as a research topic. Several cryptographic SHA-256 hash algorithms have been developed to enhance the performance of data-protection techniques. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  12. 12

    Designing new chaotic and hyperchaotic systems for chaos-based cryptography by Kadhim, Al Karawi Hayder Natiq

    Published 2019
    “…To investigate its performance in terms of security, a new chaos-based image encryption algorithm is also proposed. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Parametric system identification and active vibration control of vibrational structures using genetic algorithm by Mohammad Sofi @ Aziz, Azfi Zaihan

    Published 2007
    “…In order to construct the model, several sets of vibration data were obtained from the simulation of the flexible plate structures based on finite difference method. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Effective gene selection techniques for classification of gene expression data by Yeo, Lee Chin

    Published 2005
    “…Various k-means clustering algorithms and model-based clustering algorithms are proposed to group the genes. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Time series modeling of water level at Sulaiman Station, Klang River, Malaysia by Galavi, Hadi

    Published 2010
    “…Among the several structures of ANFIS model examined, the model with four membership functions for the model inputs and output, Guassian membership function for the fuzzification, four rules for the fuzzy inference engine, and trained using hybrid algorithm was selected as the best constructed ANFIS model. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Effectiveness of simple terminological ontology to support document retrieval in a specialized domain / Seyed Abolfazle Moosavifar by Moosavifar, Seyed Abolfazle

    Published 2014
    “…Therefore, the use of simple terminological ontology (constructed based on intuitive understanding of the domain) is proposed in this research. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Savitzky-Golay Filter-Based PLL: Modeling and Performance Validation by Hasan, K., Meraj, S.T., Othman, M.M., Lipu, M.S.H., Hannan, M.A., Muttaqi, K.M.

    Published 2022
    “…The primary objective of this article is to offer a new small-signal design of SGF-based filtration in the SRF-PLL. Using this model, a researcher can easily evaluate the SGF-PLL's behavior and stability condition. …”
    Get full text
    Get full text
    Article
  18. 18

    Optimization of hydropower reservoir system using genetic algorithm for various climatic scenarios by Tayebiyan, Aida

    Published 2015
    “…In order to increase the system efficiency and maximize the power generation, constructed operation models were optimized. To determine the optimum solution in each policy, real coded genetic algorithm is used as an optimization technique. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Modeling and sensitivity analysis of a multi-nets anns model for real-time performance-based condition monitoring of an industrial gas turbine engine by Tahan, M., Sarwar, U., Muhammad, M., Abdul Karim, Z.A.

    Published 2016
    “…Three-layer feed-forward configuaration is chosen to construct the networks, the Levenberg-Marquardt algorithm is used as the training function, and the k-fold cross-validation process is employed to obtain the optimum number of neurons in the hidden layers. …”
    Get full text
    Get full text
    Article
  20. 20

    Modeling and sensitivity analysis of a multi-nets anns model for real-time performance-based condition monitoring of an industrial gas turbine engine by Tahan, M., Sarwar, U., Muhammad, M., Abdul Karim, Z.A.

    Published 2016
    “…Three-layer feed-forward configuaration is chosen to construct the networks, the Levenberg-Marquardt algorithm is used as the training function, and the k-fold cross-validation process is employed to obtain the optimum number of neurons in the hidden layers. …”
    Get full text
    Get full text
    Article