Search Results - (( based constructive based algorithm ) OR ( data identification using algorithm ))
Search alternatives:
- identification using »
- data identification »
- based constructive »
- constructive based »
- using algorithm »
-
1
Hazard identification on fractionation column using rule based expert system
Published 2001“…The process-specific knowledge, which consists of process operation data and the process flow sheet, has been constructed using a HYSIS process simulator. …”
Get full text
Get full text
Article -
2
A novel single parent mating technique in genetic algorithm for discrete - time system identification
Published 2024“…System identification is concerned with the construction of a mathematical model based on given input and output data to represent the dynamical behaviour of a system. …”
Get full text
Get full text
Get full text
Article -
3
Fault Detection and Identification in Quadrotor System (Quadrotor Robot)
Published 2016“…The aim of the research is to construct and design a Fault Detection and Isolation algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. …”
Get full text
Get full text
Get full text
Thesis -
5
Complex word identification model for lexical simplification in the Malay language for non-native speakers
Published 2023“…The model is evaluated based on a state-of-the-art Malay corpus. This corpus is divided into training and testing data using k-fold cross-validation, where k=10. …”
Get full text
Get full text
Get full text
Thesis -
6
RFID data reliability optimiser based on two dimensions bloom filter
Published 2017“…The noise and duplicate data filtering algorithm was constructed based on bloom filter. …”
Get full text
Get full text
Article -
7
Parametric system identification and active vibration control of vibrational structures using genetic algorithm
Published 2007“…The aim of this research is to develop an Auto Regressive with eXogenous Input (ARX) model characterizing the dynamic behaviour of a two-dimensional (2D) flexible plate structure and the development of active vibration control (AVC) strategies for the structures. In order to construct the model, several sets of vibration data were obtained from the simulation of the flexible plate structures based on finite difference method. …”
Get full text
Get full text
Thesis -
8
Database encryption for a Web-based Claims System
Published 2008“…This process is to be followed by the designing the Data Flow Diagram and then the Database. The former specifies how the data will flow in the system, whereas the latter is for data storage where all data are kept such as login identifications, passwords, staff personal particulars, entitlements etc. …”
Get full text
Thesis -
9
Extrapolation detection and novelty-based node insertion for sequential growing multi-experts network
Published 2003“…Artificial neural networks (ANNs) have been used to construct empirical nonlinear models of process data. …”
Get full text
Get full text
Article -
10
PSO and Linear LS for parameter estimation of NARMAX/NARMA/NARX models for non-linear data / Siti Muniroh Abdullah
Published 2017“…Typically, parameter estimation is performed using various types of Least Squares (LS) algorithms due to its stable and efficient numerical computation. …”
Get full text
Get full text
Thesis -
11
Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri
Published 2025“…This work presents a novel graph-based semi-supervised learning (GSSL) algorithm designed for wafer defect detection. …”
Get full text
Get full text
Get full text
Thesis -
12
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…The A VL tree is used to increase the compression ratio as its compression algorithm works efficiently for all types of data. …”
Get full text
Get full text
Thesis -
13
The stopping rules for winsorized tree
Published 2017“…This mechanism is controlled by the proposed algorithm. In winsorized tree, data are screened for identifying outlier.If outlier is detected, the value is neutralized using winsorize approach. …”
Get full text
Get full text
Conference or Workshop Item -
14
Identification and analysis of hoisting safety risk factors for IBS construction based on the AcciMap and cases study
Published 2024“…Hoisting is an essential aspect of Industrial Building System (IBS) construction. Although research on hoisting safety in China has made strides to focus on “worker,” “data,” “task,” “site,” and “accident,” there still needs to be more approaches based on multi-dimensional social system thinking. …”
Get full text
Get full text
Get full text
Article -
15
Learning analytic framework for students’ academic performance and critical learning pathways
Published 2024“…These algorithms group students based on academic performance and course profiles, facilitating the identification of clusters with similar characteristics and academic trajectories. …”
Get full text
Get full text
Get full text
Article -
16
Fault Detection and Isolation for Complex System
Published 2017“…Additionally, Artificial Neural Network (ANN) is another algorithm used to determine the type of fault and isolate the fault in the system.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Correlation analysis and predictive performance based on KNN and decision tree with augmented reality for nuclear primary cooling process / Ahmad Azhari Mohamad Nor
Published 2024“…Subsequently, predictive models employing k-nearest neighbour and decision tree algorithms are constructed and evaluated based on accuracy, precision, and recall metrics. …”
Get full text
Get full text
Thesis -
18
An optimized ensemble for predicting reservoir rock properties in petroleum industry
Published 2013“…A total of 3695 data points from the 5 wells having conventional well log data and core data were used. …”
Get full text
Get full text
Thesis -
19
Investigation of features for classification RFID reading between two RFID reader in various support vector machine kernel function
Published 2022“…Instead, the distance verses RSSI algorithm is used to determine the objects to be located based on the distance of the tag to be located to each reader. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Urban landcover features identification utilizing multiband combinations and multi-level image segmentation for objectbased classification / Nurhanisah Hashim
Published 2018“…The emerging of high spectral resolution image with submeter level of accuracy lead to high potential in order to identify detailed urban landcover features. By adopting object based approached instead of pixel based will avoid the 'salt and pepper' effect that will decrease the accuracy of land-cover classification. …”
Get full text
Get full text
Thesis
