Search Results - (( data identification method algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Prototypes, simulations, observations and interviews were used as the data gathering methods. An offline FOA Java simulation was carried out to evaluate the capability of the MRA method in preventing FOA attack. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Recursive Subspace Identification Algorithm Using The Propagator Based Method by Jamaludin, Irma Wani, Abdul Wahab, Norhaliza

    Published 2017
    “…Subspace model identification (SMI) method is the effective method in identifying dynamic state space linear multivariable systems and it can be obtained directly from the input and output data. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification by Abd Samad, Md Fahmi

    Published 2011
    “…System identification is a method of determining a mathematical relation between variables and terms of a process based on observed input-output data. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Date store management in sliding window based on-line identification algorithms by Asirvadam , Vijanth Sagayan, McLoone, Sean, Irwin, George W

    Published 2001
    “…Sliding window identification algorithms use information from a store of data to optimise on-line learning. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Data mining based damage identification using imperialist competitive algorithm and artificial neural network by Gordan, Meisam, Razak, Hashim Abdul, Ismail, Zubaidah, Ghaedi, Khaled

    Published 2018
    “…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification by Jamaluddin, Hishamuddin, Abd. Samad, M. F., Ahmad, Robiah, Yaacob, M. S.

    Published 2007
    “…The genetic algorithm approach is widely recognized as an effective and flexible optimization method for system identification. …”
    Get full text
    Get full text
    Article
  11. 11

    Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification by Jamaluddin, H., Samad, M. F. A., Ahmad, R., Yaacob, M. S.

    Published 2007
    “…he genetic algorithm approach is widely recognized as an effective and flexible optimization method for system identification. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Comparison of algorithm Support Vector Machine and C4.5 for identification of pests and diseases in chili plants by M, Irfan, N, Lukman, A. A, Alfauzi, J, Jumadi

    Published 2019
    “…Information about chili pests is collected so that it becomes a database that can be used to identify disease pests using the data mining method. The use of data mining algorithms is expected to help in the identification of pests and diseases in chili plants. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Implementation of Evolutionary Algorithms to Parametric Identification of Gradient Flexible Plate Structure by Annisa, Jamali, Muhammad Hasbollah, Hassan, Lidyana, Roslan, Muhamad Sukri, Hadi

    Published 2023
    “…A square aluminium plate experimental rig with a gradient of 30° and all edges clamped were designed and fabricated to acquire input-output vibration data experimentally. This input-output data was then applied in a system identification method, which used an evolutionary algorithm with a linear autoregressive with exogenous (ARX) model structure to generate a dynamic model of the system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Implementation of Evolutionary Algorithms to Parametric Identification of Gradient Flexible Plate Structure by Annisa, Jamali, Lidyana, Roslan, Muhammad Hasbollah, Hassan

    Published 2023
    “…A square aluminium plate experimental rig with a gradient of 30° and all edges clamped were designed and fabricated to acquire input-output vibration data experimentally. This input-output data was then applied in a system identification method, which used an evolutionary algorithm with a linear autoregressive with exogenous (ARX) model structure to generate a dynamic model of the system. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification by Abd Samad, Md Fahmi

    Published 2007
    “…The genetic algorithm approach is widely recognized as an effective and flexible optimization method for system identification. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20