Search Results - (( based constructive method algorithm ) OR ( process identification using algorithm ))

Refine Results
  1. 1

    Application of system identification method coupled with evolutionary algorithms for the optimization of power consumption in a pem fuel cell propulsion system / Suhadiyana Hanapi by Hanapi, Suhadiyana

    Published 2018
    “…Secondly, in this research, an empirical dynamic model of the PEM fuel cell system in vehicles was analyzed and validated using the system identification method……”
    Get full text
    Get full text
    Book Section
  2. 2

    Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri by Pedram , Tabatabaeemoshiri

    Published 2025
    “…This study addresses the urgent issue of detecting hidden defects in semiconductor wafers that conventional methods overlook. This work presents a novel graph-based semi-supervised learning (GSSL) algorithm designed for wafer defect detection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Nonlinear auto-regressive model structure selection using binary particle swarm optimization algorithm / Ahmad Ihsan Mohd Yassin by Mohd Yassin, Ahmad Ihsan

    Published 2014
    “…The NARMAX model and its derivatives (Nonlinear Auto-Regressive with Exogenous Inputs (NARX) and Nonlinear Auto-Regressive Moving Average (NARMA)) are powerful, efficient and unified representations of a variety of nonlinear models. The identification process of NARX/NARMA/NARMAX involves structure selection and parameter estimation, which can be simultaneously performed using the widely accepted Orthogonal Least Squares (OLS) algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Complex word identification model for lexical simplification in the Malay language for non-native speakers by Salehah, Omar

    Published 2023
    “…The best model using the Gradient Boost algorithm showed an average accuracy of 92.55%, F1- score of 92.09% and G1-score of 89.7%. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    System identification of an interacting series process for real-time model predictive control by M.N., Karsiti, T.C.S., Wibowo, N., Saad

    Published 2009
    “…This paper presents the empirical modeling of the gaseous pilot plant which is a kind of interacting series process with presence of nonlinearities. In this study, the discrete-time identification approach based on subspace method with N4SID algorithm is applied to construct the state space model around a given operating point, by probing the system in open-loop with variation of input signals. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    PSO and Linear LS for parameter estimation of NARMAX/NARMA/NARX models for non-linear data / Siti Muniroh Abdullah by Abdullah, Siti Muniroh

    Published 2017
    “…PSO is a swarm-based search algorithm perform a stochastic search to explore the search space. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Secure Access To Authorized Resources Based On Fingerprint Authentication by Elmadani, Ahmed Baba

    Published 2003
    “…Finally, a unique fingerprint based key is constructed using a user's fingerprint image and the key used to access and retrieve the private key. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A single measurement of combined Direct and indirect MPPT algorithm for mismatch PV module application / Mohd Najib Mohd Hussain by Mohd Hussain, Mohd Najib

    Published 2016
    “…The signal from the sensor is then applied for power switching devices of the PO buck-boost converter by the attained maximum power point current from CoDID MPPT method. The system is constructed from model-based design (MBD) of the PV system. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Speaker identification through feature fusion based deep learning / Rashid Jahangir by Rashid , Jahangir

    Published 2021
    “…Speaker identification refers to the process of recognising human voices using artificial intelligence techniques. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Database encryption for a Web-based Claims System by Syed Zulkarnain Syed Idrus

    Published 2008
    “…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
    Get full text
    Thesis
  13. 13

    Fault location identification in power transmission networks using novel non-intrusive fault monitoring systems by Chang, Hsueh-Hsien, Yang, Chuan Choong, Lee, Wei-Jen

    Published 2020
    “…This paper proposes a novel fault localization method that is based on the non-intrusive fault monitoring (NIFM) techniques in high-voltage/extra-high-voltage (HV/EHV) power transmission networks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Identification and analysis of hoisting safety risk factors for IBS construction based on the AcciMap and cases study by Junjia, Yin, Alias, Aidi Hizami, Haron, Nuzul Azam, Abu Bakar, Nabilah

    Published 2024
    “…Finally, we used AcciMap technology to construct a qualitative IBS hoisting management model, which exhaustively presents the systematic levels and propagation paths of the influencing factors by the PDCA method. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Pipeline condition assessment by instantaneous frequency response over hydroinformatics based technique—An experimental and field analysis by Muhammad Hanafi, Yusop, Ghazali, M. F., Mohd Fadhlan, Mohd Yusof, Muhammad Aminuddin, Pi Remli

    Published 2021
    “…Various studies have been done of improvised leak detection methods, and Hilbert Huang Transform has the potential to overcome the concern. The HHT processing algorithm has been successfully proven through simulation and experimentally tested to evaluate the ability of pressure transient analysis to predict and locate the leakage in the pipeline system. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Correlation analysis and predictive performance based on KNN and decision tree with augmented reality for nuclear primary cooling process / Ahmad Azhari Mohamad Nor by Mohamad Nor, Ahmad Azhari

    Published 2024
    “…Subsequently, predictive models employing k-nearest neighbour and decision tree algorithms are constructed and evaluated based on accuracy, precision, and recall metrics. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim by Ibrahim, Mohd Faisal

    Published 2017
    “…It differs from other existing content negotiation approaches by introducing the idea of combining dynamic and static device capabilities detection methods. It consists of a device database and two processing components: (1) device identification module and (2) device capabilities detection module. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Stress mental health symptom assessment mobile application for young adults by Lee, Chun Hoong

    Published 2023
    “…As for the panic attack prediction feature, the application will transmit user-input responses to a model previously trained using historical data. Before this stage, the KNN algorithm is employed to construct the model using Google Form response data as part of the application development process. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani by Seyed Asadollah, Abdiesfandani

    Published 2016
    “…The algorithm simulates two important tasks that are frequently used by the human experts to identify summarizing strategies used to produce the summary sentences: 1) sentences relevance identification; and 2) summarizing strategies identification. …”
    Get full text
    Get full text
    Thesis