Search Results - (( parameter identification using algorithm ) OR ( code classifications _ algorithm ))
Search alternatives:
- parameter identification »
- identification using »
- code classifications »
- using algorithm »
-
1
The development of virtual product life cycle design tool using artificial intelligence technique
Published 2008“…The generated features from code classification algorithm give the information of machining parameter through the mapping algorithm. …”
Get full text
Monograph -
2
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…This paper presents a classification of android malware using candidate detectors generated from an unsupervised association rule of Apriori algorithm improved with particle swarm optimization to train three different supervised classifiers. …”
Get full text
Get full text
Get full text
Proceeding Paper -
3
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…However, supervised learning technique has limitations for malware classification task. This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. …”
Get full text
Get full text
Get full text
Article -
4
-
5
-
6
Identification of continuous-time hammerstein system using sine cosine algorithm
Published 2019“…This paper presents the development of identification of continuous-time Hammerstein systems based on Sine Cosine Algorithm (SCA). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Simultaneous Computation of Model Order and Parameter Estimation for System Identification Based on Gravitational Search Algorithm
Published 2015“…System identification is a technique used to obtain a mathematical model of a system by performing analysis of input-output characteristic of the system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
MULTIVARIABLE CLOSED-LOOP SYSTEM IDENTIFICATION USING ITERATIVE LEAKY LEAST MEAN SQUARES METHOD
Published 2017“…In this thesis. iterative Leaky Least Mean Squares (LLMS) based methods are proposed to address the limitations ofLS method in MultiInput Multi-Output (MIMO) closed-loop system identification. In this research. novel algorithms have been developed to: (I) isolate the less interacting channe Is using a modified partial correlation algorithm. (2) achieve unbiased and consistent parameter estimates using an iterative LLMS algorithm and (3) develop parsimonious models for closed-loop MIMO systems. …”
Get full text
Get full text
Thesis -
9
Source code classification using latent semantic indexing with structural and frequency term weighting
Published 2012“…In recent years, there is an increase in the number of open source software.Hence, the demand for automatic software classification is also increasing.Latent Semantic Indexing (LSI) is an information retrieval approach that is utilized in classifying source code programs. …”
Get full text
Get full text
Get full text
Article -
10
Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection
Published 2024“…Most of the algorithms got promising results and classify packets based on DSCP accurately. …”
Get full text
Get full text
Get full text
Article -
11
Image classification based on sparse-coded features using sparse coding technique for aerial imagery: a hybrid dictionary approach
Published 2023“…Aerial photography; Aircraft detection; Antennas; Codes (symbols); Discrete cosine transforms; Discrete wavelet transforms; Glossaries; Image classification; Image coding; Image enhancement; Learning algorithms; Learning systems; Object recognition; Remote sensing; Satellite imagery; Satellites; Unmanned aerial vehicles (UAV); Discrete tchebichef transforms; Discriminative features; Finite Ridgelet Transform; Histogram of oriented gradients; Image processing and computer vision; Scale invariant feature transforms; SIFT; Sparse coding; Classification (of information)…”
Article -
12
Identification of non-linear dynamic systems using fuzzy system with constrained membership functions
Published 2004“…This study deals with the use of the rule-based fuzzy system for the identification of non-linear dynamic systems. …”
Get full text
Get full text
Get full text
Thesis -
13
Hybrid DE-PEM algorithm for identification of UAV helicopter
Published 2014“…Design/methodology/approach – In this study, flight data were collected and analyzed; MATLAB-based system identification algorithm was developed using DE and PEM; parameterized state-space model parameters were estimated using the developed algorithm and model dynamic analysis. …”
Get full text
Get full text
Get full text
Article -
14
Modified multi-verse optimizer for nonlinear system identification of a double pendulum overhead crane
Published 2021“…The HMVOSCA algorithm is used to tune the linear and nonlinear parameters to reduce the gap between the estimated results and the actual results. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Hybrid algorithm for NARX network parameters' determination using differential evolution and genetic algorithm
Published 2013“…A hybrid optimization algorithm using Differential Evolution (DE) and Genetic Algorithm (GA) is proposed in this study to address the problem of network parameters determination associated with the Nonlinear Autoregressive with eXogenous inputs Network (NARX-network). …”
Get full text
Get full text
Get full text
Article -
16
-
17
Effect of parameters variation on the performance of particle swarm optimization algorithm for tag coverage problem of radio frequency identification network
Published 2016“…In this paper, PSO (Particle Swarm Optimization) algorithm is used to optimize the tag coverage problem. …”
Get full text
Get full text
Article -
18
Chain coding and pre processing stages of handwritten character image file
Published 2010“…Each of the pre-processing stages and the chain coding process will be described in detail giving improvised algorithms, and examples of the processes on existing samples from the database shown. …”
Get full text
Get full text
Get full text
Article -
19
Identification of continuous-time model of hammerstein system using modified multi-verse optimizer
Published 2021“…The mMVO based method is then used for identifying the parameters of linear and nonlinear subsystems in the Hammerstein model using the given input and output data. …”
Get full text
Get full text
Thesis -
20
Segment Particle Swarm Optimization Adoption for Large-Scale Kinetic Parameter Identification of Metabolic Network Model
Published 2018“…The seven sensitive kinetic parameters were used in both the algorithms to minimize the model response errors. …”
Get full text
Get full text
Get full text
Article
