Search Results - (( re evaluation system algorithm ) OR ( user identification using algorithm ))*

Refine Results
  1. 1

    Optimization Of Fuzzy Logic Controllers With Genetic Algorithm For Two-Part-Type And Re-Entrant Production Systems by Homayouni, Seyed Mahdi

    Published 2008
    “…GDF and GSF controllers are evaluated for two test cases namely “two-part-type production line” and “re-entrant production system”. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Effective predicate identification algorithm for XML retrieval by Roko, Abubakar, C. Doraisamy, Shyamala, Nakone, Bello

    Published 2018
    “…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    A hybrid grey wolf assisted-sparrow search algorithm for frequency control of RE integrated system by Fadheel, Bashar Abbas, Wahab, Noor Izzri Abdul, Mahdi, Ali Jafer, Premkumar, Manoharan, Radzi, Mohd Amran Bin Mohd, Soh, Azura Binti Che, Veerasamy, Veerapandiyan, Irudayaraj, Andrew Xavier Raj

    Published 2023
    “…Moreover, the robustness of the proffered method is also evaluated under the random varying load, variation of HPS system parameter, and weather intermittency of RE resources in real-time conditions. …”
    Get full text
    Get full text
    Article
  4. 4

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Removal of heavy metals from water by functionalized carbon nanotubes with deep eutectic solvents: An artificial neural network approach / Seef Saadi Fiyadh by Seef Saadi , Fiyadh

    Published 2019
    “…The best result achieved for Pb2+ removal using ANFIS algorithm is with RE 7.078%. For As3+ removal using different adsorbents, two algorithms were applied for the modelling, the feed-forward back-propagation maximum RE achieved is 5.97% while, the NARX algorithm achieved better accuracy with maximum RE of 5.79%. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm by Yahya Alyasseri, Zaid Abdi Alkareem

    Published 2020
    “…For addressing these points, a novel person identification method that is using EEG with multi-level wavelet decomposition and multi-objective flower pollination algorithm is proposed in this thesis. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model by Yaacob, Mohd. Shafiek, Jamaluddin, Hishamuddin

    Published 2001
    “…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    Smart cards and the fingerprint: a framework for user identification and authentication by Omar, M. H., Din, Roshidi, Tahir, H. M.

    Published 2003
    “…As a result, the research proposed a framework for user identification and authentication in automatic-teller-machine (ATM) systems using fingerprints and smart cards as opposed to the PIN and magnetic-stripe cards.…”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Tag clouds algorithm with the inclusion of personality traits by Ahmad Affandi, Supli

    Published 2015
    “…This algorithm is beneficial for decision making using information visualization in which personality traits of the user are heavily inclined. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Identifying the influential spreaders in multilayer interactions of online social networks by Al-Garadi, M.A., Varathan, Kasturi Dewi, Ravana, S.D., Ahmed, E., Chang, V.

    Published 2016
    “…The measurement results are found to be more reliable when the identification algorithms are applied to proposed topological representation compared when these algorithms are applied to single layer representations.…”
    Get full text
    Get full text
    Article
  14. 14

    Online fingerprint recognition by Khairul Bariyah, Abd Rahim

    Published 2010
    “…Fingerprints are the most popularly used in biometric identification and recognition systems, because they can be easily used and their features are highly reliable. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15

    Fault Detection and Identification in Quadrotor System (Quadrotor Robot) by Chan, Shi Jing, Pebrianti, Dwi

    Published 2016
    “…This Artificial Neural Network (ANN) is an algorithm that is used to determine the type of fault and the severity level as well as isolate the fault from the system. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    DEVELOPMENT OF IRIS RECOGNITION SYSTEM by Mohd Kamarudin, Nur Eliza

    Published 2016
    “…This project implements an iris recognition algorithm as a biometric identification. There is a need for reliable and security identification since typical identification methods using identity cards, passwords, and user name possess threats to the security of an organization because of human error. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    An efficient fuzzy clustering algorithm for mining user session clusters on web log data by Mallik, M. A., Zulkurnain, Nurul Fariza

    Published 2021
    “…Client access patterns can be mined from web access log information using Web Usage Mining (WUM) techniques. Because there are so many end-user sessions and URL resources, the size of web user session data is enormous. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    A graphical user interface application for continuous-time identification of dynamical system by Rahmat, Mohd. Fua'ad, Omar, Rosli, Jamaluddin, Hishamuddin

    Published 2002
    “…This paper introduces a Graphical User Interface (GUI) application in system identification and parameter estimation of dynamic systems using Generalized Poisson Moment Functionals (GPMF) method based on Instrumental Variable (IV) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Age detection from face using Convolutional Neural Network (CNN) / Hanin Hanisah Usok @ Yusoff by Usok @ Yusoff, Hanin Hanisah

    Published 2024
    “…In this project, we want to create an age identification system that uses Convolutional Neural Network (CNN) algorithms to estimate people's ages fast and accurately from facial images. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Malaysia solar energy experience: intelligent fault location algorithm for unbalanced radial distribution network including PV systems by Farzan, Payam, Izadi, Mahdi, Gomes, Chandima, Hesamian, Mohammad Hesam

    Published 2016
    “…This paper presents a novel fault location algorithm based on the recording of short circuit power values at the primary substation of unbalanced radial distribution networks including PV systems. …”
    Get full text
    Get full text
    Get full text
    Article