Search Results - (( basic validation research algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    System identification using Extended Kalman Filter by Alias, Ahmad Hafizi

    Published 2017
    “…In order to evaluate the performance of the EKF learning algorithm, the proposed algorithm validation were analyzed using model validation methods as a checker such as One Step Ahead (OSA) and correlation coefficient (R2). …”
    Get full text
    Get full text
    Student Project
  2. 2
  3. 3
  4. 4

    BMTutor research design: Malay sentence parse tree visualization by Muhamad Noor, Yusnita, Jamaludin, Zulikha

    Published 2014
    “…This paper discusses the research design for BMTutor.BMTutor is a prototype for visualizing Malay sentences that is combined with sentence checker, sentence correction and word attribute components.The purpose of BMTutor is to check sentence validation, provide sentence correction for invalid sentence used and produce parse tree visualization.The research design involved can be divided into four phases; categorizing sentence and produce repository (Phase1), developing models and algorithms (Phase 2); development of a prototype (Phase 3); and prototype testing (Phase 4).To date, this system is the only one designed with the functions and characteristics as in BMTutor.There are two BM parsers to check the validity of simple BM sentences had been developed.Both parsers performed three phases in research design, namely 1) the collection of sentence or CFG, 2) develop a prototype, and 3) conduct evaluation.The phases involved are the basic method in developing a prototype. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory by Rusli, Julie Roslita

    Published 2011
    “…The results produced by the tools are then validated with other research finding. This tool can be used to ease the process of developing a new March test algorithm for NPSF.…”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Investigating and developing the best method in shortest path for implementing a geographical information system (e-map) for Peninsular Malaysia by Ahmad, Ab. Rahman, Zenon , Nasaruddin, Hassan, Haswadi

    Published 2005
    “…This research will be focused on determining the best shortest path algorithm for the first possible best (fastest, safest and cheapest) route and also to search the other possible best routes. …”
    Get full text
    Get full text
    Monograph
  8. 8

    A hybrid particle swarm optimization - extreme learning machine approach for intrusion detection system by M.H., Ali, Mohamad, Fadlizolkipi, Ahmad Firdaus, Zainal Abidin, Nik Zulkarnaen, Khidzir

    Published 2018
    “…Our propose model has been apple based as intrusion detection and validated based on NSL-KDD data set. Our developed model has been compared against a basic ELM. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Design of nonlinear adaptive interaction algorithm controller for improvement of tracking performance of X-Y table ball screw drive system by Retas, Zain

    Published 2023
    “…The contribution is Nonlinear Adaptive Interaction Algorithm (NAIA). The controller is developed based on the enhancement and modification of the basic Adaptive Interaction Algorithm Controller (AIA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Advanced differential interferometry synthetic aperture radar techniques for deformation monitoring: a review on sensors and recent research development by Idrees, Mohammed Oludare, Saeidi, Vahideh, Pradhan, Biswajeet, Yusuf, Yusuf Ahmed

    Published 2014
    “…In the second part, the techniques are compared in order to establish more linkage in terms of the variability of their applications, strength and validation of the interpreted results. Also, current issues in sensor and algorithm development are discussed. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Development of durian ontology from unstructured text and external knowledge source / Khairul Nurmazianna Ismail by Ismail, Khairul Nurmazianna

    Published 2014
    “…In the third phase, external knowledge sources such as knowledge model from Agropedia is embedded as the basic element of ontology development. Then, the basic element is use ontology editor for implementation phase. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Parametric modelling of a TRMS using dynamic spread factor particle swarm optimisation by Toha, Siti Fauziah, Abd Latiff, I., Mohamad, M., Tokhi, M Osman

    Published 2009
    “…Results in both time and frequency domains portray a very good parametric model that mimic well the behavior of a TRMS. Validation tests clearly show the effectiveness of the algorithm considered in this work. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15
  16. 16
  17. 17

    Effort Estimation Model for Function Point Measurement by Koh, Tieng Wei

    Published 2007
    “…Generally, most of the algorithmic models were generated based on historical projects, and therefore, the same methodology has been applied in this research work. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Hybridflood algorithms minimizing redundant messages and maximizing efficiency of search in unstructured P2P networks by Barjini, Hassan

    Published 2012
    “…Therefore the unstructured model of the P2P network has attracted the greatest attention from both users and the researcher communities. Searching is an essential and basic activity for all P2P applications. …”
    Get full text
    Get full text
    Thesis
  19. 19

    An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan by Syed Adnan, Syed Farid

    Published 2019
    “…To date, this research found no known practical implementation of the AAḃ algorithm to prove or to validate its efficiency on a real-world computing platform. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Development an accurate and stable range-free localization scheme for anisotropic wireless sensor networks by Han, Fengrong

    Published 2022
    “…Accordingly, this study aspires to bridge the research gap by exploring a new DV-Hop algorithm to build a fast, costefficient, strong range-free localization scheme. …”
    Get full text
    Get full text
    Thesis