Search Results - (( based constructive method algorithm ) OR ( processes identification method algorithm ))
Search alternatives:
- processes identification »
- identification method »
- based constructive »
- method algorithm »
-
1
Application of system identification method coupled with evolutionary algorithms for the optimization of power consumption in a pem fuel cell propulsion system / Suhadiyana Hanapi
Published 2018“…This thesis makes a number of key contributions to the advancement of fuel cell vehicle design within two main research areas; powertrain system design based on quality energy, and optimization system based on biology based algorithms. …”
Get full text
Get full text
Book Section -
2
Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri
Published 2025“…This study addresses the urgent issue of detecting hidden defects in semiconductor wafers that conventional methods overlook. This work presents a novel graph-based semi-supervised learning (GSSL) algorithm designed for wafer defect detection. …”
Get full text
Get full text
Get full text
Thesis -
3
PSO and Linear LS for parameter estimation of NARMAX/NARMA/NARX models for non-linear data / Siti Muniroh Abdullah
Published 2017“…PSO is a swarm-based search algorithm perform a stochastic search to explore the search space. …”
Get full text
Get full text
Thesis -
4
Nonlinear auto-regressive model structure selection using binary particle swarm optimization algorithm / Ahmad Ihsan Mohd Yassin
Published 2014“…System Identification (SI) is a control engineering discipline concerned with the discovery of mathematical models based on dynamic measurements collected from the system. …”
Get full text
Get full text
Thesis -
5
System identification of an interacting series process for real-time model predictive control
Published 2009“…This paper presents the empirical modeling of the gaseous pilot plant which is a kind of interacting series process with presence of nonlinearities. In this study, the discrete-time identification approach based on subspace method with N4SID algorithm is applied to construct the state space model around a given operating point, by probing the system in open-loop with variation of input signals. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Complex word identification model for lexical simplification in the Malay language for non-native speakers
Published 2023“…This model is constructed based on the development of the CWI model outlined by the previous researcher. …”
Get full text
Get full text
Get full text
Thesis -
7
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…The final choice combines a feature-based and correlation-based approach. The thesis proposes a novel method of allowing users access after authenticating them by their fingerprints. …”
Get full text
Get full text
Thesis -
8
-
9
-
10
A single measurement of combined Direct and indirect MPPT algorithm for mismatch PV module application / Mohd Najib Mohd Hussain
Published 2016“…The signal from the sensor is then applied for power switching devices of the PO buck-boost converter by the attained maximum power point current from CoDID MPPT method. The system is constructed from model-based design (MBD) of the PV system. …”
Get full text
Get full text
Thesis -
11
Speaker identification through feature fusion based deep learning / Rashid Jahangir
Published 2021“…In the speaker identification process, extracting discriminative and salient features from speaker utterances is an important task to accurately identify speakers. …”
Get full text
Get full text
Thesis -
12
Pipeline condition assessment by instantaneous frequency response over hydroinformatics based technique—An experimental and field analysis
Published 2021“…The HHT processing algorithm has been successfully proven through simulation and experimentally tested to evaluate the ability of pressure transient analysis to predict and locate the leakage in the pipeline system. …”
Get full text
Get full text
Get full text
Article -
13
Fault location identification in power transmission networks using novel non-intrusive fault monitoring systems
Published 2020“…This paper proposes a novel fault localization method that is based on the non-intrusive fault monitoring (NIFM) techniques in high-voltage/extra-high-voltage (HV/EHV) power transmission networks. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
Database encryption for a Web-based Claims System
Published 2008“…This process is to be followed by the designing the Data Flow Diagram and then the Database. …”
Get full text
Thesis -
15
Identification and analysis of hoisting safety risk factors for IBS construction based on the AcciMap and cases study
Published 2024“…Finally, we used AcciMap technology to construct a qualitative IBS hoisting management model, which exhaustively presents the systematic levels and propagation paths of the influencing factors by the PDCA method. …”
Get full text
Get full text
Get full text
Article -
16
-
17
Correlation analysis and predictive performance based on KNN and decision tree with augmented reality for nuclear primary cooling process / Ahmad Azhari Mohamad Nor
Published 2024“…Subsequently, predictive models employing k-nearest neighbour and decision tree algorithms are constructed and evaluated based on accuracy, precision, and recall metrics. …”
Get full text
Get full text
Thesis -
18
A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim
Published 2017“…It differs from other existing content negotiation approaches by introducing the idea of combining dynamic and static device capabilities detection methods. It consists of a device database and two processing components: (1) device identification module and (2) device capabilities detection module. …”
Get full text
Get full text
Thesis -
19
Stress mental health symptom assessment mobile application for young adults
Published 2023“…Before this stage, the KNN algorithm is employed to construct the model using Google Form response data as part of the application development process. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…We then develop a new algorithm to address the summarizing strategies identification problem. …”
Get full text
Get full text
Thesis
