Search Results - (( java application interface algorithm ) OR ( basic identification system algorithm ))

Refine Results
  1. 1

    Recursive Subspace Identification Algorithm Using The Propagator Based Method by Jamaludin, Irma Wani, Abdul Wahab, Norhaliza

    Published 2017
    “…Basically, subspace identifications are based on algorithms from numerical algebras which are the QR decomposition and Singular Value Decomposition (SVD). …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Adaptive Linear System Identification over Simulated Wireless Environment by Elamin, Musab Jabralla Omer Elamin

    Published 2009
    “…Wireless technologies have become one of the basic industrial pillars, whereas system identification represents an important tool in many practical engineering circumstances and thus sooner or later both wireless technologies and system identification should be linked together in sense of having an identifier that is able to reliably identify a system over wireless links. …”
    Get full text
    Get full text
    Thesis
  3. 3

    System identification using Extended Kalman Filter by Alias, Ahmad Hafizi

    Published 2017
    “…System identification is getting more intensive from researcher to develop an algorithm with work efficiently and more accurate. …”
    Get full text
    Get full text
    Student Project
  4. 4

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus by Darus, Zamzuhairi

    Published 2003
    “…Voltage stability problems have been one of the major concerns for electric utilities as a result of a system heavy loading. This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Application-Programming Interface (API) for Song Recognition Systems by Murtadha Arif Sahbudin, Chakib Chaouch, Salvatore Serrano

    Published 2024
    “…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
    Article
  7. 7

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8
  9. 9

    Hazard identification on fractionation column using rule based expert system by Mohd Yunus, Mohd Yusri, Ali, Mohamad Wijayanuddin

    Published 2001
    “…The algorithm is found applicable for any of process system, however the expert system developed is only limited to the application for fractionation column of oleo chemical plant.…”
    Get full text
    Get full text
    Article
  10. 10

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  11. 11

    Model Identification Using Neuro-Fuzzy Approach by Lemma, T.A.

    Published 2018
    “…In Sect. 3.3, basic theory of neural networks and fuzzy systems are elaborated. …”
    Get full text
    Get full text
    Article
  12. 12

    Model Identification Using Neuro-Fuzzy Approach by Lemma, T.A.

    Published 2018
    “…In Sect. 3.3, basic theory of neural networks and fuzzy systems are elaborated. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15

    Simultaneous Computation of Model Order and Parameter Estimation of a Heating System Based on Gravitational Search Algorithm for Autoregressive with Exogenous Inputs by Kamil Zakwan, Mohd Azmi, Zuwairie, Ibrahim, Pebrianti, Dwi, Sophan Wahyudi, Nawawi, Nor Azlina, Ab. Aziz

    Published 2015
    “…System identification is a class of control system engineering that determines physical functionality of a plant and represents them in the form of mathematical expression by utilizing real experimental data. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Optimization of supply chain management by simulation based RFID with XBEE Network by Soomro, Aftab Ahmed

    Published 2015
    “…Among the widely used technology in recent years is Radio Frequency Identification (RFID). It is an advanced Auto-ID wireless network based configuration system used for identification and tracking of items movement data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Designing an integrated AIOT system for tracking class attendance by Kuak, Xuan Ren

    Published 2024
    “…The system is able to capture the students' real facial feature data, and uses it as a tool to achieve high-accuracy student identification. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20