Search Results - (( automatic identification system algorithm ) OR ( basic optimization method algorithm ))

Refine Results
  1. 1

    Designing an integrated AIOT system for tracking class attendance by Kuak, Xuan Ren

    Published 2024
    “…The project aims to develop an automatic facial recognition system that supports artificial intelligence (AI) and the Internet of Things (IoT) for attendance system. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    System Identification And Control Of Automatic Car Pedal Pressing System For Low-Speed Driving In A Road Traffic Delay by Lai, Chong Jin

    Published 2022
    “…This project presents system identification and control of automatic car pedal pressing system for low-speed driving in a road traffic delay. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Smart Cards And The Fingerprint : A Proposed Framework For The Automatic Teller Machine (ATM) System by Mohd. Hasbullah, Omar

    Published 2002
    “…As a result, the research proposed a framework for user identification and authentication in automatic teller machine (ATM) systems using fingerprints and smart cards as opposed to the PIN and magnetic-stripe cards. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Real-time system identification of an unmanned quadcopter system using fully tuned radial basis function neural networks by Pairan, Mohammad Fahmi, Shamsudin, Syariful Syafiq, Mohd Anwar, Mohd Shazlan

    Published 2021
    “…Radial basis function network (RBF) based on system identification can be utilised as an alternative technique for quadcopter modelling. …”
    Get full text
    Get full text
    Article
  5. 5

    Particle swarm optimization (PSO) for CNC route problem by Nur Azia Azwani, Ismail

    Published 2002
    “…We often see many of the method of Genetic Algorithm (GA), Ant Colony Optimization (ACO), Simulated Annealing Algorithm (SAA) and PSO are used for any optimization problems. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6
  7. 7
  8. 8

    Online fingerprint recognition by Khairul Bariyah, Abd Rahim

    Published 2010
    “…The systems are increasingly employed into business, trading and living fields for automatic personal identification. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9
  10. 10
  11. 11

    Real-time system identification of an unmanned quadcopter system using fully tuned radial basis function neural networks by Pairan, Mohammad Fahmi, Shamsudin, Syariful Syafiq, Yaakub, Mohd Fauzi, Mohd Anwar, Mohd Shazlan

    Published 2021
    “…Radial basis function network (RBF) based on system identification can be utilised as an alternative technique for quadcopter modelling. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    Fuzzy modelling for distillation column by Yusof, Rubiyah, Khalid, Marzuki, Ibrahim, M. Z.

    Published 2005
    “…This paper presents a hybrid method to tune the parameters of TS fuzzy system automatically using Genetic Algorithms (GA) and Recursive Least Square (RLS) technique. …”
    Get full text
    Conference or Workshop Item
  15. 15

    Automatic clustering of generalized regression neural network by similarity index based fuzzy c-means clustering by Husain, Hafizah, Khalid, Marzuki, Yusof, Rubiyah

    Published 2004
    “…We applied the technique for system identification and modeling and found the results to be encouraging and efficient. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Optimal power flow based on fuzzy linear programming and modified Jaya algorithms by Alzihaymee, Warid Sayel Warid

    Published 2017
    “…Meanwhile, the proposed QOJaya algorithm produces better results than the basic Jaya method in terms of solution optimality and convergence speed. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Voting algorithms for large scale fault-tolerant systems by Karimi, Abbas

    Published 2011
    “…To solve this problem and gain benefits of this algorithm, we employed parallel algorithm technique and by using optimal number of processors, we could propose optimal algorithms known as Parallel Average Voting and Parallel Weighted Average Voting which both have optimal time complexity and less calculation cost. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Fingerprint feature extraction based discrete cosine transformation (DCT) by Chin Kim On, Paulraj M. Pandiyan, Sazali Yaacob, Azali Saudi

    Published 2009
    “…Fingerprint identification and verification are one of the most significant and reliable identification methods. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  20. 20

    Modelling of the anti-collision algorithm in RFID system: article / Shafinaz Ismail by Ismail, Shafinaz

    Published 2014
    “…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
    Get full text
    Get full text
    Article