Search Results - (( probably identification using algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol using 64 bits index is proved having the lowest non-unequivocally identification probability. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Identification of heavy-flavour jets with the CMS detector in pp collisions at 13 TeV by Sirunyan, A. M., Tumasyan, A. R., Adam, Wolfgang, Ambrogi, Federico, Asilar, Ece, Md. Ali, Mohd. Adli

    Published 2018
    “…Heavy-flavour jet identification algorithms have been improved compared to those used previously at centre-of-mass energies of 7 and 8 TeV. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification by Abd Samad, Md Fahmi

    Published 2011
    “…A deterministic mutation-based algorithm is introduced to overcome this problem. Identification studies using NARX (Nonlinear AutoRegressive with eXogenous input) models employing simulated systems and real plant data are used to demonstrate that the algorithm is able to detect significant variables and terms faster and to select a simpler model structure than other well-known EC methods.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  5. 5
  6. 6
  7. 7
  8. 8

    Particle swarm optimization for NARX structure selection application on DC motor model: article / Mohd I. Abdullah by Abdullah, Mohd I.

    “…This paper presents the nonlinear identification of a DC motor using Binary Particle Swarm Optimization (BPSO) algorithm, as a model structure selection method, replacing the typical Orthogonal Least Squares (OLS) used in system identification. …”
    Get full text
    Get full text
    Article
  9. 9

    Identification of hammerstain model using stochastic perturbation simultaneous approximation by Nurriyah, Mohd Noor

    Published 2016
    “…Furthermore, the Identification is done using MATLAB Simulink to simulate the Hammerstein Model. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10

    Particle swarm optimization for NARX structure selection: application on DC motor model / Mohd Ikhwan Abdullah by Abdullah, Mohd Ikhwan

    Published 2010
    “…This thesis was presents the nonlinear identification of a DC motor using Binary Particle Swarm Optimization (BPSO) algorithm, as a model structure selection method, replacing the typical Orthogonal Least Squares (OLS) used in system identification. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Acoustic echo cancellation using adaptive filtering algorithms for quranic accents (Qiraat) identification by Kamarudin, Noraziahtulhidayu, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Abushariah, Mohammad A. M., Hashim, Shaiful Jahari, Hassan Azhari, Abd Rauf

    Published 2015
    “…In order to conduct the AEC, three adaptive algorithms known as affine projection (AP), least mean square (LMS), and recursive least squares (RLS) are used during the preprocessing phase. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Modelling of the anti-collision algorithm in RFID system: article / Shafinaz Ismail by Ismail, Shafinaz

    Published 2014
    “…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
    Get full text
    Get full text
    Article
  14. 14

    Modelling of the anti-collision algorithm in RFID system / Shafinaz Ismail by Ismail, Shafinaz

    Published 2014
    “…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Optimization of modified Bouc–Wen model for magnetorheological damper using modified cuckoo search algorithm by Rosmazi, Rosli, Zamri, Mohamed

    Published 2021
    “…The newly proposed algorithm was tested using a set of standard benchmark functions with different searching space and global optima placement. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Tree-based contrast subspace mining method by Florence Sia Fui Sze

    Published 2020
    “…Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
    Get full text
    Get full text
    Get full text
    Thesis