Search Results - (( probably identification system algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol using 64 bits index is proved having the lowest non-unequivocally identification probability. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification by Abd Samad, Md Fahmi

    Published 2011
    “…Model structure selection is one of the important steps in a system identification process. Evolutionary computation (EC) is known to be an effective search and optimization method and in this paper EC is proposed as a model structure selection algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Identification of hammerstain model using stochastic perturbation simultaneous approximation by Nurriyah, Mohd Noor

    Published 2016
    “…The main benefit of the SPSA-based method is it can be applied to identification of Hammerstein systems even though less restrictive assumptions. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4

    Particle swarm optimization for NARX structure selection: application on DC motor model / Mohd Ikhwan Abdullah by Abdullah, Mohd Ikhwan

    Published 2010
    “…This thesis was presents the nonlinear identification of a DC motor using Binary Particle Swarm Optimization (BPSO) algorithm, as a model structure selection method, replacing the typical Orthogonal Least Squares (OLS) used in system identification. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Particle swarm optimization for NARX structure selection application on DC motor model: article / Mohd I. Abdullah by Abdullah, Mohd I.

    “…This paper presents the nonlinear identification of a DC motor using Binary Particle Swarm Optimization (BPSO) algorithm, as a model structure selection method, replacing the typical Orthogonal Least Squares (OLS) used in system identification. …”
    Get full text
    Get full text
    Article
  6. 6

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Modelling of the anti-collision algorithm in RFID system: article / Shafinaz Ismail by Ismail, Shafinaz

    Published 2014
    “…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
    Get full text
    Get full text
    Article
  8. 8

    Modelling of the anti-collision algorithm in RFID system / Shafinaz Ismail by Ismail, Shafinaz

    Published 2014
    “…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    Acoustic echo cancellation using adaptive filtering algorithms for quranic accents (Qiraat) identification by Kamarudin, Noraziahtulhidayu, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Abushariah, Mohammad A. M., Hashim, Shaiful Jahari, Hassan Azhari, Abd Rauf

    Published 2015
    “…This research work aims to present our work towards Quranic accents (Qiraat) identification, which emphasizes on acoustic echo cancellation (AEC) of all echoed Quranic signals during the preprocessing phase of the system development. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    All-in-1 adverse drug reaction reporting system / Long Chiau Ming … [et al.] by Chiau Ming, Long, Karuppannan, Mahmathi, Abdul Wahab, Izyan, Abd Wahab, Mohd Shahezwan, Zulkifly, Hanis Hanum

    Published 2014
    “…The system allows clinician to perform the objective causality assessment that is necessary for consistent and accurate identification of ADRs. …”
    Get full text
    Get full text
    Get full text
    Book Section