Search Results - (( java _ implementation algorithm ) OR ( parameter identification auto algorithm ))
Search alternatives:
- implementation algorithm »
- parameter identification »
- identification auto »
- auto algorithm »
-
1
Development of auto-tracking mobile robot
Published 2018“…In this project HSI-based color filtering algorithm were used for object identification. This is because HSI parameter are more stable in different light and background conditions, so it is selected as the main parameters of this system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Improvement of Auto-Tracking Mobile Robot based on HSI Color Model
Published 2018“…In this project HSI-based color enhancement algorithm were used for object identification. This is because HSI parameter are more stable in different light and background conditions, so it is selected as the main parameters of this system. …”
Get full text
Get full text
Get full text
Article -
3
Nonlinear auto-regressive model structure selection using binary particle swarm optimization algorithm / Ahmad Ihsan Mohd Yassin
Published 2014“…The identification process of NARX/NARMA/NARMAX involves structure selection and parameter estimation, which can be simultaneously performed using the widely accepted Orthogonal Least Squares (OLS) algorithm.…”
Get full text
Get full text
Book Section -
4
Nonlinear auto-regressive model structure selection using binary particle swarm optimization algorithm / Ahmad Ihsan Mohd Yassin
Published 2014“…The identification process of NARX/NARMA/NARMAX involves structure selection and parameter estimation, which can be simultaneously performed using the widely accepted Orthogonal Least Squares (OLS) algorithm. …”
Get full text
Get full text
Thesis -
5
Discrete-Time System Identification Based On Novel Information Criterion Using Genetic Algorithm
Published 2017“…This paper investigates the identification of dynamic system in the form of NARX (Non-linear AutoRegressive with eXogenous input) model based on PMIC2 and AIC using GA. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Design of Auto-stabilization Control Technique for a Quadrotor System
Published 2013“…Therefore, the main focus of this research is to design an appropriate control algorithm that able to auto-stabilize the quadrotor at hover. …”
Get full text
Get full text
Get full text
Article -
7
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
8
Modeling and System Identification using Extended Kalman Filter for a Quadrotor System
Published 2013“…This paper presents modeling and system identification for auto-stabilization of a quadrotor system through the implementation of Extended Kalman Filter (EKF). …”
Get full text
Get full text
Article -
9
NARX modelling for steam distillation pilot plant using binary particle swarm optimisation technique / Najidah Hambali
Published 2019“…This study proposes a system identification of SDPP using NARX model. The model structure selection of polynomial NARX had been focused on Binary Particle Swarm Optimisation (BPSO) algorithm. …”
Get full text
Get full text
Thesis -
10
Design of auto-stabilization control technique for a quadrotor system
Published 2013“…Therefore, the main focus of this research is to design an appropriate control algorithm that able to auto-stabilize the quadrotor at hover. …”
Get full text
Get full text
Get full text
Article -
11
Assessment of ANN-based auto-reclosing scheme developed on single machine-infinite bus model with IEEE 14-bus system model data
Published 2009Get full text
Get full text
Conference or Workshop Item -
12
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
13
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
14
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
15
Neural network based adaptive pid controller for shell-and-tube heat exchanger
Published 2019“…Thus, these controller parameters need to be repeatedly retuned. In this circumstance, auto tuning of the controller parameters is incredibly important. …”
Get full text
Get full text
Student Project -
16
Neural network based adaptive pid controller for shell-and-tube heat exchanger: article
Published 2019“…Thus, these controller parameters need to be repeatedly retuned. In this circumstance, auto tuning of the controller parameters is incredibly important. …”
Get full text
Get full text
Article -
17
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
18
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
19
Optimization of supply chain management by simulation based RFID with XBEE Network
Published 2015“…Among the widely used technology in recent years is Radio Frequency Identification (RFID). It is an advanced Auto-ID wireless network based configuration system used for identification and tracking of items movement data. …”
Get full text
Get full text
Get full text
Thesis -
20
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
Get full text
Get full text
Get full text
Book
