Search Results - (( data identification system algorithm ) OR ( java implementation modified algorithm ))

Refine Results
  1. 1

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  3. 3

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  4. 4

    Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification by Abd Samad, Md Fahmi

    Published 2011
    “…System identification is a method of determining a mathematical relation between variables and terms of a process based on observed input-output data. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    System identification using Extended Kalman Filter by Alias, Ahmad Hafizi

    Published 2017
    “…System identification is getting more intensive from researcher to develop an algorithm with work efficiently and more accurate. …”
    Get full text
    Get full text
    Student Project
  6. 6

    Fsm-Based Enhanced March C- Algorithm For Memory Built-In Self-Test by CH’NG , MING ZONG

    Published 2017
    “…Through the analysis of the fault patterns and other algorithm, it was found that multiple read operation within a single MARCH element from MARCH-NU algorithm can aid in the identification of the Read Destructive Fault whereas having HOLD time in the MARCH 9N algorithm would expose the Data Retention Fault. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Hybrid DE-PEM algorithm for identification of UAV helicopter by Tijani, Ismaila, Akmeliawati, Rini, Legowo, Ari, Budiyono, Agus, Abdul Muthalif, Asan Gani

    Published 2014
    “…Originality/value – This study presents a novel hybrid algorithm for system identification of an autonomous helicopter model.…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Recursive Subspace Identification Algorithm Using The Propagator Based Method by Jamaludin, Irma Wani, Abdul Wahab, Norhaliza

    Published 2017
    “…Subspace model identification (SMI) method is the effective method in identifying dynamic state space linear multivariable systems and it can be obtained directly from the input and output data. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Identification of non-linear dynamic systems using fuzzy system with constrained membership functions by Yaakob, Mohd. Shafiek

    Published 2004
    “…This study deals with the use of the rule-based fuzzy system for the identification of non-linear dynamic systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification by Jamaluddin, Hishamuddin, Abd. Samad, M. F., Ahmad, Robiah, Yaacob, M. S.

    Published 2007
    “…The genetic algorithm approach is widely recognized as an effective and flexible optimization method for system identification. …”
    Get full text
    Get full text
    Article
  13. 13

    Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification by Jamaluddin, H., Samad, M. F. A., Ahmad, R., Yaacob, M. S.

    Published 2007
    “…he genetic algorithm approach is widely recognized as an effective and flexible optimization method for system identification. …”
    Get full text
    Get full text
    Article
  14. 14

    Identification of continuous-time hammerstein system using sine cosine algorithm by E. F., Junis, J. J., Jui, Mohd Helmi, Suid, Mohd Ashraf, Ahmad

    Published 2019
    “…This paper presents the development of identification of continuous-time Hammerstein systems based on Sine Cosine Algorithm (SCA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16

    Simultaneous Computation of Model Order and Parameter Estimation for System Identification Based on Gravitational Search Algorithm by Kamil Zakwan, Mohd Azmi, Pebrianti, Dwi, Zuwairie, Ibrahim, Shahdan, Sudin, Sophan Wahyudi, Nawawi

    Published 2015
    “…System identification is a technique used to obtain a mathematical model of a system by performing analysis of input-output characteristic of the system. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Missing tags detection algorithm for radio frequency identification (RFID) data stream by Zainudin, Nur 'Aifaa

    Published 2019
    “…AC complement algorithm was used to compare the different in each set of data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Effective predicate identification algorithm for XML retrieval by Roko, Abubakar, C. Doraisamy, Shyamala, Nakone, Bello

    Published 2018
    “…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification by Abd Samad, Md Fahmi

    Published 2007
    “…The genetic algorithm approach is widely recognized as an effective and flexible optimization method for system identification. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    A novel single parent mating technique in genetic algorithm for discrete - time system identification by Abd Samad @ Mahmood, Md Fahmi, Zainuddin, Farah Ayiesya, Jamaluddin, Hishamuddin, Azad, Abul K. M.

    Published 2024
    “…System identification is concerned with the construction of a mathematical model based on given input and output data to represent the dynamical behaviour of a system. …”
    Get full text
    Get full text
    Get full text
    Article