Search Results - (( developing identification system algorithm ) OR ( java implementation case algorithm ))
Search alternatives:
- developing identification »
- identification system »
- java implementation »
- implementation case »
- system algorithm »
- case algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Hybrid DE-PEM algorithm for identification of UAV helicopter
Published 2014“…Design/methodology/approach – In this study, flight data were collected and analyzed; MATLAB-based system identification algorithm was developed using DE and PEM; parameterized state-space model parameters were estimated using the developed algorithm and model dynamic analysis. …”
Get full text
Get full text
Get full text
Article -
4
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
5
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005Get full text
Get full text
Thesis -
6
Multivariable system identification for dynamic discrete-time nonlinear system using genetic algorithm
Published 2002“…The development of a multivariable system identification model for dynamic discrete-time nonlinear system using genetic algorithm was discussed and analysed. …”
Get full text
Get full text
Conference or Workshop Item -
7
Multivariable system identification for dynamic discrete-time nonlinear system using genetic algorithm
Published 2002“…The development of a multivariable system identification model for dynamic discrete-time nonlinear system using genetic algorithm was discussed and analysed. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Java based expert system for selection of natural fibre composite materials
Published 2013“…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
Get full text
Get full text
Get full text
Article -
9
Identification algorithms of flexible structure using neural networks
Published 2006“…This paper present an investigation into the development of identification system approaches for dynamic modelling characterization of a two dimensional flexible plate structures. …”
Get full text
Get full text
Conference or Workshop Item -
10
-
11
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
Review -
12
Statistical computing for forensic firearm pattern identification: Evaluating a fisher linear discriminant analysis-based algorithm against fixed-impulse noise
Published 2025“…Forensic laboratories analyze firearm-related evidence utilizing established ballistic identification systems such as the Integrated Ballistic Identification System (IBIS), Advanced Ballistics Analysis System (ALIAS), EVOFINDER Automated Ballistic Identification System, and CONDOR Ballistic Identification System. …”
Get full text
Get full text
Get full text
Article -
13
MULTIVARIABLE CLOSED-LOOP SYSTEM IDENTIFICATION USING ITERATIVE LEAKY LEAST MEAN SQUARES METHOD
Published 2017“…In this thesis. iterative Leaky Least Mean Squares (LLMS) based methods are proposed to address the limitations ofLS method in MultiInput Multi-Output (MIMO) closed-loop system identification. In this research. novel algorithms have been developed to: (I) isolate the less interacting channe Is using a modified partial correlation algorithm. (2) achieve unbiased and consistent parameter estimates using an iterative LLMS algorithm and (3) develop parsimonious models for closed-loop MIMO systems. …”
Get full text
Get full text
Thesis -
14
Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat
Published 2008“…Consequently, another algorithm for maximum loadability identification using EP optimization technique was also developed. …”
Get full text
Get full text
Thesis -
15
Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali
Published 2022“…Besides, from the results of validation of the system algorithm, it is proven that the DIS system algorithm is also suitable to be used on the measured areal surface topography of bumps features to segment and isolate the synthesized edges from its surrounding. …”
Get full text
Get full text
Thesis -
16
Identification of continuous-time hammerstein system using sine cosine algorithm
Published 2019“…This paper presents the development of identification of continuous-time Hammerstein systems based on Sine Cosine Algorithm (SCA). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Iterative closed-loop identification of MIMO systems using ARX-based Leaky Least Mean Square Algorithm
Published 2014“…Closed-loop identification of MIMO systems is considered. An iterative Leaky Least Mean Squares (LLMS) algorithm is proposed for the development of ARX structure. …”
Get full text
Get full text
Conference or Workshop Item -
18
System identification using Extended Kalman Filter
Published 2017“…System identification is getting more intensive from researcher to develop an algorithm with work efficiently and more accurate. …”
Get full text
Get full text
Student Project -
19
Modified multi-verse optimizer for nonlinear system identification of a double pendulum overhead crane
Published 2021Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
