Search Results - (( java application learning algorithm ) OR ( software identification method algorithm ))

Refine Results
  1. 1
  2. 2

    Register Transfer Level Implementation Of Pooling - Based Feature Extraction For Finger Vein Identification by Mohamed Ali, Mohamed Hassan

    Published 2017
    “…Many improvements methods were utilized to increase the speed and accuracy of the identification. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali by Mohd Razali, Ainaa Farhanah

    Published 2022
    “…The system algorithm is verified and validates on two sloped bumps surface topographies that have been simulated using MATLAB software and measured using the Alicona Infinite Focus Measurement (IFM) device, respectively. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    Three phase fault algorithm in distribution system by using database approach and impedance based method by Shamsudin, N.H., Latiff, A.A., Abas, N., Mokhlis, Hazlie, Awalin, L.J.

    Published 2012
    “…The configuration of 132/11kV from actual distribution system in Malaysia with 38 nodes is modelled using the PSCAD/EMTDC software. This work attempt to combine fault section identification with impedance based method in order to address non-homogeneity of cables in distribution system. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…In this paper, we introduce an education tool for learning metaheuristic algorithms that allows displaying the convergence speed of the corresponding metaheuristic upon setting/changing the dependable parameters. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Discrete-Time System Identification Based On Novel Information Criterion Using Genetic Algorithm by Abd Samad, Md Fahmi, Mohd Nasir, Abdul Rahman

    Published 2017
    “…Parameter magnitude-based information criterion 2 (PMIC2), as a novel information criterion, is used alongside Akaike information criterion (AIC). Genetic algorithm (GA) as a popular search method, is used for selecting a model structure. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Comparison Of Crossover In Genetic Algorithm For Discrete-Time System Identification by Zainuddin, Farah Ayiesya, Abd Samad, Md Fahmi

    Published 2021
    “…This paper investigates the effect of different types of crossover, namely, single-point, double-point, multiple-point and uniform crossover, within GA in producing an optimum model structure for system identification. This was carried out using a computational software on a number of simulated data. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Edge Detection Algorithm For Image Processing Of Search And Rescue Robot by A/L Sivem, Prasanthran

    Published 2016
    “…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    SYSTEM IDENTIFICATION AND MODEL PREDICTIVE CONTROL FOR INTERACTING SERIES PROCESS WITH NONLINEAR DYNAMICS by SETYO WIBOWO, TRI CHANDRA

    Published 2009
    “…The subspace system identification method is used to estimate the linear model parameters. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    An automated multimodal white matter hyperintensities identification in MRI brain images using image processing / Iza Sazanita Isa by Isa, Iza Sazanita

    Published 2018
    “…In parallel, the automated performance and manual delineation for WMH identification is validated to determine the degree of similarity between both the methods. …”
    Get full text
    Get full text
    Book Section
  16. 16

    An automated multimodal white matter hyperintensities identification in MRI brain images using image processing / Iza Sazanita Isa by Isa, Iza Sazanita

    Published 2018
    “…In parallel, the automated performance and manual delineation for WMH identification is validated to determine the degree of similarity between both the methods. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19
  20. 20

    Autoreclosure in Extra High Voltage Lines using Taguchi’s Method and Optimized Neural Networks by Desta, Zahlay F., K.S., Ramarao, Taj, Mohammed Baloch

    Published 2008
    “…The fault identification prior to reclosing is based on optimized artificial neural network associated with standard Error Back-Propagation, Levenberg Marquardt Algorithm and Resilient Back-Propagation training algorithms together with Taguchi’s Method. …”
    Get full text
    Get full text
    Conference or Workshop Item