Search Results - (( evolution identification system algorithm ) OR ( java implementation plan algorithm ))

Refine Results
  1. 1

    Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus by Darus, Zamzuhairi

    Published 2003
    “…Voltage stability problems have been one of the major concerns for electric utilities as a result of a system heavy loading. This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    Nonlinear identification of a small scale unmanned helicopter using optimized NARX network with multiobjective differential evolution by Tijani, Ismaila B., Akmeliawati, Rini, Legowo, Ari, Budiyono, Agus

    Published 2014
    “…This study proposes a hybrid of conventional back propagation training algorithm for the NARX network and multiobjective differential evolution (MODE) algorithm for identification of a nonlinear model of an unmanned small scale helicopter from experimental flight data.The proposed hybrid algorithm was able to produce models with Pareto-optimal compromise between the design objectives. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Hybrid DE-PEM algorithm for identification of UAV helicopter by Tijani, Ismaila, Akmeliawati, Rini, Legowo, Ari, Budiyono, Agus, Abdul Muthalif, Asan Gani

    Published 2014
    “…Originality/value – This study presents a novel hybrid algorithm for system identification of an autonomous helicopter model.…”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Autotuning PID Controllers for Quadplane Hybrid UAV using Differential Evolution Algorithm by Pairan, Mohammad Fahmi, Shamsudin, Syariful Syafiq

    Published 2024
    “…The paper presents a method for autotuning attitude PID for a quadplane UAV using differential evolution (DE), X-Plane simulation, and neural network (NN)-based system identification. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Autotuning PID Controllers for Quadplane Hybrid UAV using Differential Evolution Algorithm by Pairan, Mohammad Fahmi, Shamsudin, Syariful Syafiq, Yaakub, Mohd Fauzi

    Published 2024
    “…The paper presents a method for autotuning attitude PID for a quadplane UAV using differential evolution (DE), X-Plane simulation, and neural network (NN)-based system identification. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Performance of well known packet scheduling algorithms in the downlink 3GPP LTE system by Mohd Ramli, Huda Adibah, Basukala, Riyaj, Sandrasegaran, Kumbesan, Patachaianand, Rachod

    Published 2009
    “…This paper contributes to the identification of a suitable packet scheduling algorithm for use in the downlink 3GPP LTE system supporting video streaming services. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…The project was planned using the Kanban development methodology, and was built using HTML, CSS, JavaScript, Django, NumPy and pandas. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The development of this project is based on a framework of 5 main stages: planning, analysis, design, implementation and testing. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This methodology consist of Requirement and Planning, Design, Construction, Testing and Implementation. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar by Seyed Alireza, Ravanfar

    Published 2017
    “…In addition, the structural parameters of a system can be accurately estimated through the proposed system identification methods for both cases of linear and nonlinear conditions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Implementation of RIO in UMJaNetSim / Chan Chin We by Chan, Chin We

    Published 2004
    “…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
    Get full text
    Get full text
    Thesis
  17. 17

    Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems by Franco, Daniel Jose Da Graca Peceguina

    Published 2021
    “…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Songs Search Using Human Humming Voice by Abdul Rahman, Mohamad Ariff

    Published 2007
    “…The scopes for this project are human humming voice, voice capture in WA V format, songs database, and MIDI file comparing algorithm. Methodologies used in this system are based on system analysis and design methodology comprising planning, analysis, design and implementation. …”
    Get full text
    Get full text
    Final Year Project
  19. 19

    Fingerprint frontier: the evolution of biometric security by Khalifa, Othman Omran

    Published 2023
    “…Chapter two provides a detailed lens into the core mechanics, followed by an exploration of the algorithms that drive the matching processes in Chapter Three. …”
    Get full text
    Get full text
    Get full text
    Book
  20. 20