Search Results - (( java implementation _ algorithm ) OR ( parameter identification auto algorithm ))

Refine Results
  1. 1

    Development of auto-tracking mobile robot by Ahmad Shahrizan, Abdul Ghani, Suresh, Sundarajoo

    Published 2018
    “…In this project HSI-based color filtering algorithm were used for object identification. This is because HSI parameter are more stable in different light and background conditions, so it is selected as the main parameters of this system. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Improvement of Auto-Tracking Mobile Robot based on HSI Color Model by Sundarajoo, Suresh, Ahmad Shahrizan, Abdul Ghani

    Published 2018
    “…In this project HSI-based color enhancement algorithm were used for object identification. This is because HSI parameter are more stable in different light and background conditions, so it is selected as the main parameters of this system. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Nonlinear auto-regressive model structure selection using binary particle swarm optimization algorithm / Ahmad Ihsan Mohd Yassin by Mohd Yassin, Ahmad Ihsan

    Published 2014
    “…The identification process of NARX/NARMA/NARMAX involves structure selection and parameter estimation, which can be simultaneously performed using the widely accepted Orthogonal Least Squares (OLS) algorithm.…”
    Get full text
    Get full text
    Book Section
  4. 4

    Nonlinear auto-regressive model structure selection using binary particle swarm optimization algorithm / Ahmad Ihsan Mohd Yassin by Mohd Yassin, Ahmad Ihsan

    Published 2014
    “…The identification process of NARX/NARMA/NARMAX involves structure selection and parameter estimation, which can be simultaneously performed using the widely accepted Orthogonal Least Squares (OLS) algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Discrete-Time System Identification Based On Novel Information Criterion Using Genetic Algorithm by Abd Samad, Md Fahmi, Mohd Nasir, Abdul Rahman

    Published 2017
    “…This paper investigates the identification of dynamic system in the form of NARX (Non-linear AutoRegressive with eXogenous input) model based on PMIC2 and AIC using GA. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Design of Auto-stabilization Control Technique for a Quadrotor System by Abas, Norafizah, Ab. Rashid , Mohd Zamzuri, Ibrahim, Zulkifilie, Samsudin, Nur hazahsha

    Published 2013
    “…Therefore, the main focus of this research is to design an appropriate control algorithm that able to auto-stabilize the quadrotor at hover. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Modeling and System Identification using Extended Kalman Filter for a Quadrotor System by Abas, Norafizah, Ibrahim, Zulkifilie, Rahim, Nor Hidayah, M. Kassim, Anuar

    Published 2013
    “…This paper presents modeling and system identification for auto-stabilization of a quadrotor system through the implementation of Extended Kalman Filter (EKF). …”
    Get full text
    Get full text
    Article
  9. 9

    NARX modelling for steam distillation pilot plant using binary particle swarm optimisation technique / Najidah Hambali by Hambali, Najidah

    Published 2019
    “…This study proposes a system identification of SDPP using NARX model. The model structure selection of polynomial NARX had been focused on Binary Particle Swarm Optimisation (BPSO) algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Design of auto-stabilization control technique for a quadrotor system by Abas, Norafizah, Akmeliawati, Rini, Ibrahim, Zulkiflie, Rashid, M. Zamzuri A., Samsudin, N. Hazahsha

    Published 2013
    “…Therefore, the main focus of this research is to design an appropriate control algorithm that able to auto-stabilize the quadrotor at hover. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  13. 13

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  14. 14

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Neural network based adaptive pid controller for shell-and-tube heat exchanger by Othman, Mohamad Hakimi

    Published 2019
    “…Thus, these controller parameters need to be repeatedly retuned. In this circumstance, auto tuning of the controller parameters is incredibly important. …”
    Get full text
    Get full text
    Student Project
  16. 16

    Neural network based adaptive pid controller for shell-and-tube heat exchanger: article by Othman, Mohamad Hakimi

    Published 2019
    “…Thus, these controller parameters need to be repeatedly retuned. In this circumstance, auto tuning of the controller parameters is incredibly important. …”
    Get full text
    Get full text
    Article
  17. 17

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Optimization of supply chain management by simulation based RFID with XBEE Network by Soomro, Aftab Ahmed

    Published 2015
    “…Among the widely used technology in recent years is Radio Frequency Identification (RFID). It is an advanced Auto-ID wireless network based configuration system used for identification and tracking of items movement data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
    Get full text
    Get full text
    Get full text
    Book