Search Results - (( based constructive method algorithm ) OR ( using identification method algorithm ))
Search alternatives:
- identification method »
- using identification »
- based constructive »
- method algorithm »
-
1
Risk assessment for safety and health algorithm for building construction in Oman
Published 2015“…Then, 40 safety and health specialists were involved in carrying out a risk assessment using the existing method of risk analysis (RA) and the new proposed method of RASH. …”
Get full text
Get full text
Thesis -
2
Application of system identification method coupled with evolutionary algorithms for the optimization of power consumption in a pem fuel cell propulsion system / Suhadiyana Hanapi
Published 2018“…Secondly, in this research, an empirical dynamic model of the PEM fuel cell system in vehicles was analyzed and validated using the system identification method……”
Get full text
Get full text
Book Section -
3
Parametric system identification and active vibration control of vibrational structures using genetic algorithm
Published 2007“…The aim of this research is to develop an Auto Regressive with eXogenous Input (ARX) model characterizing the dynamic behaviour of a two-dimensional (2D) flexible plate structure and the development of active vibration control (AVC) strategies for the structures. In order to construct the model, several sets of vibration data were obtained from the simulation of the flexible plate structures based on finite difference method. …”
Get full text
Get full text
Thesis -
4
A novel single parent mating technique in genetic algorithm for discrete - time system identification
Published 2024“…A typical rule is that the model must have a good balance between parsimony and accuracy in estimating a dynamic system. As a popular search method, genetic algorithm (GA) is used for selecting a model structure. …”
Get full text
Get full text
Get full text
Article -
5
Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri
Published 2025“…This study addresses the urgent issue of detecting hidden defects in semiconductor wafers that conventional methods overlook. This work presents a novel graph-based semi-supervised learning (GSSL) algorithm designed for wafer defect detection. …”
Get full text
Get full text
Get full text
Thesis -
6
Nonlinear auto-regressive model structure selection using binary particle swarm optimization algorithm / Ahmad Ihsan Mohd Yassin
Published 2014“…System Identification (SI) is a control engineering discipline concerned with the discovery of mathematical models based on dynamic measurements collected from the system. …”
Get full text
Get full text
Thesis -
7
Fault Detection and Identification in Quadrotor System (Quadrotor Robot)
Published 2016“…The aim of the research is to construct and design a Fault Detection and Isolation algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Optimal parameter estimation of permanent magnet synchronous motor by using Mothflame optimization algorithm / Abdolmajid Dejamkhooy and Sajjad Asefi
Published 2018“…Simulation results and their comparison with Particle Swarm Optimization based method show high performance and good ability of the proposed method in PMSM parameter estimation.…”
Get full text
Get full text
Get full text
Article -
9
PSO and Linear LS for parameter estimation of NARMAX/NARMA/NARX models for non-linear data / Siti Muniroh Abdullah
Published 2017“…Typically, parameter estimation is performed using various types of Least Squares (LS) algorithms due to its stable and efficient numerical computation. …”
Get full text
Get full text
Thesis -
10
Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali
Published 2024“…Conventional methods of inspection of constructions are time-consuming, require much labor, and make people stand in hazardous conditions. …”
Get full text
Get full text
Student Project -
11
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…Finally, a unique fingerprint based key is constructed using a user's fingerprint image and the key used to access and retrieve the private key. …”
Get full text
Get full text
Thesis -
12
Complex word identification model for lexical simplification in the Malay language for non-native speakers
Published 2023“…The best model using the Gradient Boost algorithm showed an average accuracy of 92.55%, F1- score of 92.09% and G1-score of 89.7%. …”
Get full text
Get full text
Get full text
Thesis -
13
-
14
Fault Detection and Isolation for Complex System
Published 2017“…The proposed method for the fault identification is using hybrid technique that combines Kalman filter and Artificial Neural Network (ANN). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
A single measurement of combined Direct and indirect MPPT algorithm for mismatch PV module application / Mohd Najib Mohd Hussain
Published 2016“…MIC is a promising method to keep the electrical power output from PV module at maximum capacity through maximum power point tracking (MPPT) algorithm during full-sun and mismatch module occurrence. …”
Get full text
Get full text
Thesis -
16
System identification of an interacting series process for real-time model predictive control
Published 2009“…In this study, the discrete-time identification approach based on subspace method with N4SID algorithm is applied to construct the state space model around a given operating point, by probing the system in open-loop with variation of input signals. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Fault location identification in power transmission networks using novel non-intrusive fault monitoring systems
Published 2020“…This paper proposes a novel fault localization method that is based on the non-intrusive fault monitoring (NIFM) techniques in high-voltage/extra-high-voltage (HV/EHV) power transmission networks. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
Speaker identification through feature fusion based deep learning / Rashid Jahangir
Published 2021“…Speaker identification refers to the process of recognising human voices using artificial intelligence techniques. …”
Get full text
Get full text
Thesis -
19
Pipeline condition assessment by instantaneous frequency response over hydroinformatics based technique—An experimental and field analysis
Published 2021“…The results showed that, although with a low ratio of signal-to-noise, the proposed method could be used as an automatic selector for Intrinsic Mode Function (IMF). …”
Get full text
Get full text
Get full text
Article -
20
Identification and analysis of hoisting safety risk factors for IBS construction based on the AcciMap and cases study
Published 2024“…Finally, we used AcciMap technology to construct a qualitative IBS hoisting management model, which exhaustively presents the systematic levels and propagation paths of the influencing factors by the PDCA method. …”
Get full text
Get full text
Get full text
Article
