Search Results - (( java implementation some algorithm ) OR ( parallel identification based algorithm ))
Search alternatives:
- parallel identification »
- identification based »
- java implementation »
- implementation some »
- some algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Online system identification development based on recursive weighted least square neural networks of nonlinear hammerstein and wiener models.
Published 2022“…Best Hammerstein parallel NN polynomial based model and series-parallel NN polynomial model are 88.75% and 93.9% respectively, for best Hammerstein parallel NN sigmoid based model and series-parallel NN sigmoid based model 78.26% and 95.95% respectively, and for best Hammerstein parallel NN hyperbolic tangent based model and series-parallel NN hyperbolic tangent based model 70.7% and 96.4% respectively. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Design and implementation of a real-time adaptive learning algorithm controller for a 3-DOF parallel manipulator / Mustafa Jabbar Hayawi
Published 2015“…A parallel manipulator is a closed loop mechanism which consists of a moving platform that is connected to a fixed base by at least two kinematic chains in parallel. …”
Get full text
Get full text
Thesis -
5
Tile-Level Parallelism For H.264/Avc Codec Using Parallel Domain Decomposition Algorithm On Shared Memory Architecture
Published 2015“…The theme of this thesis is based on the utilisation of features of the parallel model in the design phase of an algorithm in order to reduce the computational complexity in comparison with the serial algorithm. …”
Get full text
Get full text
Thesis -
6
A comparison study between integrated OBFARX-NN and OBF-NN for modeling of nonlinear systems in extended regions of operation
Published 2014“…A residuals-based sequential identification algorithm using parallel integration of linear Orthornormal basis filters-Auto regressive with exogenous input (OBFARX) and a nonlinear neural network (NN) models is developed. …”
Get full text
Get full text
Article -
7
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
8
-
9
-
10
Wavelet network based online sequential extreme learning machine for dynamic system modeling
Published 2013“…Wavelet network (WN) has been introduced in many applications of dynamic systems modeling with different learning algorithms. In this paper an online sequential extreme learning machine (OSELM) algorithm adopted as training procedure for wavelet network based on serial-parallel nonlinear autoregressive exogenous (NARX) model. …”
Get full text
Conference or Workshop Item -
11
Integrated OBF-NN models for extrapolation enhancement in conventional neural networks for nonlinear systems
Published 2011“…A residuals-based sequential identification algorithm using parallel integration of linear Orthornormal basis filters (OBF) and a nonlinear feedforward (MLP) NN model is used and applied to the nonlinear Van de Vusse reactor. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Collaborative adaptive filtering approach for the identification of complex-valued improper signals
Published 2019“…This paper proposes a novel hybrid filter for data-adaptive optimal identification and modeling of complex-valued real-world signals based on the convex combination approach. …”
Get full text
Get full text
Get full text
Article -
13
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
14
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
15
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
16
Fpga-Based Accelerator For The Identification Of Finger Vein Pattern Via K-Nearest Centroid Neighbors
Published 2016“…In conclusion, the finger vein identification hardware architecture based on KNCN classifier is successfully implemented on an FPGA board with faster processing time as compared with software-based implementation of KNCN classifier in MATLAB.…”
Get full text
Get full text
Thesis -
17
OPTIMIZATION OF HYBRID-FUZZY CONTROLLER FOR SERVOMOTOR CONTROL USING A MODIFIED GENETIC ALGORITHM
Published 2011“…In this thesis, a new optimization GA-based algorithm that emanates from modification of conventional GA to reduce the iterations number and the duration time, namely, semi-parallel operation genetic algorithm (SPOGA) is proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Integrated OBF-NN models with enhanced extrapolation capability for nonlinear systems
Published 2013“…For this purpose, a residuals-based identification algorithm using parallel integration of linear orthonormal basis filters (OBF) and neural networks model is developed and analyzed under range extrapolations. …”
Get full text
Get full text
Get full text
Citation Index Journal -
19
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article -
20
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers
