Search Results - (( based constructive method algorithm ) OR ( using identification based algorithm ))

Refine Results
  1. 1

    Risk assessment for safety and health algorithm for building construction in Oman by Al-Anbari, Saud Said

    Published 2015
    “…Risk assessment matrices are widely used to evaluate risks related to such hazards. Existing risk matrices are designed based on brainstorming sessions, which may make these matrices risky to use because such sessions are based mainly on experience and knowledge about the decision at hand. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A novel single parent mating technique in genetic algorithm for discrete - time system identification by Abd Samad @ Mahmood, Md Fahmi, Zainuddin, Farah Ayiesya, Jamaluddin, Hishamuddin, Azad, Abul K. M.

    Published 2024
    “…System identification is concerned with the construction of a mathematical model based on given input and output data to represent the dynamical behaviour of a system. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Application of system identification method coupled with evolutionary algorithms for the optimization of power consumption in a pem fuel cell propulsion system / Suhadiyana Hanapi by Hanapi, Suhadiyana

    Published 2018
    “…This thesis makes a number of key contributions to the advancement of fuel cell vehicle design within two main research areas; powertrain system design based on quality energy, and optimization system based on biology based algorithms. …”
    Get full text
    Get full text
    Book Section
  4. 4

    Fault Detection and Identification in Quadrotor System (Quadrotor Robot) by Chan, Shi Jing, Pebrianti, Dwi

    Published 2016
    “…The aim of the research is to construct and design a Fault Detection and Isolation algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Complex word identification model for lexical simplification in the Malay language for non-native speakers by Salehah, Omar

    Published 2023
    “…This model is constructed based on the development of the CWI model outlined by the previous researcher. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Nonlinear auto-regressive model structure selection using binary particle swarm optimization algorithm / Ahmad Ihsan Mohd Yassin by Mohd Yassin, Ahmad Ihsan

    Published 2014
    “…System Identification (SI) is a control engineering discipline concerned with the discovery of mathematical models based on dynamic measurements collected from the system. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Parametric system identification and active vibration control of vibrational structures using genetic algorithm by Mohammad Sofi @ Aziz, Azfi Zaihan

    Published 2007
    “…The aim of this research is to develop an Auto Regressive with eXogenous Input (ARX) model characterizing the dynamic behaviour of a two-dimensional (2D) flexible plate structure and the development of active vibration control (AVC) strategies for the structures. In order to construct the model, several sets of vibration data were obtained from the simulation of the flexible plate structures based on finite difference method. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Optimal parameter estimation of permanent magnet synchronous motor by using Mothflame optimization algorithm / Abdolmajid Dejamkhooy and Sajjad Asefi by Dejamkhooy, Abdolmajid, Asefi, Sajjad

    Published 2018
    “…Simulation results and their comparison with Particle Swarm Optimization based method show high performance and good ability of the proposed method in PMSM parameter estimation.…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri by Pedram , Tabatabaeemoshiri

    Published 2025
    “…This study addresses the urgent issue of detecting hidden defects in semiconductor wafers that conventional methods overlook. This work presents a novel graph-based semi-supervised learning (GSSL) algorithm designed for wafer defect detection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Secure Access To Authorized Resources Based On Fingerprint Authentication by Elmadani, Ahmed Baba

    Published 2003
    “…Finally, a unique fingerprint based key is constructed using a user's fingerprint image and the key used to access and retrieve the private key. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali by Wan Ghazali, Wan Nurdayini Batrisyia

    Published 2024
    “…The objectives of this research include assessing the impact of UAV height and applying the Difference of Gaussian (DoG) Algorithms in crack identification. The goal here is to establish the level of effectiveness of the DoG algorithm in detecting cracks in images derived from orthomosaics at different heights. …”
    Get full text
    Get full text
    Student Project
  12. 12

    PSO and Linear LS for parameter estimation of NARMAX/NARMA/NARX models for non-linear data / Siti Muniroh Abdullah by Abdullah, Siti Muniroh

    Published 2017
    “…Typically, parameter estimation is performed using various types of Least Squares (LS) algorithms due to its stable and efficient numerical computation. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Identification and analysis of hoisting safety risk factors for IBS construction based on the AcciMap and cases study by Junjia, Yin, Alias, Aidi Hizami, Haron, Nuzul Azam, Abu Bakar, Nabilah

    Published 2024
    “…Finally, we used AcciMap technology to construct a qualitative IBS hoisting management model, which exhaustively presents the systematic levels and propagation paths of the influencing factors by the PDCA method. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    System identification of an interacting series process for real-time model predictive control by M.N., Karsiti, T.C.S., Wibowo, N., Saad

    Published 2009
    “…In this study, the discrete-time identification approach based on subspace method with N4SID algorithm is applied to construct the state space model around a given operating point, by probing the system in open-loop with variation of input signals. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Speaker identification through feature fusion based deep learning / Rashid Jahangir by Rashid , Jahangir

    Published 2021
    “…Speaker identification refers to the process of recognising human voices using artificial intelligence techniques. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A single measurement of combined Direct and indirect MPPT algorithm for mismatch PV module application / Mohd Najib Mohd Hussain by Mohd Hussain, Mohd Najib

    Published 2016
    “…The signal from the sensor is then applied for power switching devices of the PO buck-boost converter by the attained maximum power point current from CoDID MPPT method. The system is constructed from model-based design (MBD) of the PV system. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Fault Detection and Isolation for Complex System by Chan, Shi Jing, Bayuaji, Luhur, Rosdiyana, Samad, Mahfuzah, Mustafa, Nor Rul Hasma, Abdullah, Zainah, Md. Zain, Pebrianti, Dwi

    Published 2017
    “…A two wheel robot is used as a complex system in this study. The aim of the research is to construct and design a Fault Detection and Isolation algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Database encryption for a Web-based Claims System by Syed Zulkarnain Syed Idrus

    Published 2008
    “…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
    Get full text
    Thesis
  20. 20

    Fault location identification in power transmission networks using novel non-intrusive fault monitoring systems by Chang, Hsueh-Hsien, Yang, Chuan Choong, Lee, Wei-Jen

    Published 2020
    “…This paper proposes a novel fault localization method that is based on the non-intrusive fault monitoring (NIFM) techniques in high-voltage/extra-high-voltage (HV/EHV) power transmission networks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper