Search Results - (( process identification based algorithm ) OR ( process rectification using algorithm ))

Refine Results
  1. 1

    Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification by Abd Samad, Md Fahmi

    Published 2011
    “…System identification is a method of determining a mathematical relation between variables and terms of a process based on observed input-output data. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    A Pixel to Pixel Correspondence and Region of Interest in Stereo Vision Application by Hamzah, Rostam Affendi, A Aziz, Khairul Azha, M Shokri, Ahmad Sayuthi

    Published 2012
    “…The algorithm uses Sum of Absolute Differences (SAD) which is developed using Matlab software. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Statistical computing for forensic firearm pattern identification: Evaluating a fisher linear discriminant analysis-based algorithm against fixed-impulse noise by Chuan, Zun Liang, Abraham Lim, Bing Sern, Tan, Chek Cheng, Abdul Aziz, Jemain, Liong, Choong-Yeun

    Published 2025
    “…However, these systems require physical verification by experts, resulting in the process being time-consuming. Previous studies developed a Fisher Linear Discriminant Analysis (FLDA)-based ballistic identification algorithm to address this limitation, encompassing image pre-processing, feature extraction, and identification. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Hazard identification on fractionation column using rule based expert system by Mohd Yunus, Mohd Yusri, Ali, Mohamad Wijayanuddin

    Published 2001
    “…The study has contributed to an improvement of hazard identification technique and proposed an algorithm by considering the whole consequences of process deviation in each stream. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Investigation And Development Of Flattening Algorithms For Curved Latent Fingerprint Images by Chong, Bei Wei

    Published 2015
    “…Boundary of interested area can be acquired using a predefined algorithm or define by user using interactive drawing. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Safety Analysis Of Unsignalized Intersections Under Erroneous Road Crash Data Influence by Ahmed, Ashar

    Published 2016
    “…As a result of the rectification process, which involved the use of Nested Filtered Search Algorithm (NFSA) to match the accidents with the intersections where they might have occurred, 16 sites were correctly identified that initiated the second phase of the study. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani by Seyed Asadollah, Abdiesfandani

    Published 2016
    “…We then develop a new algorithm to address the summarizing strategies identification problem. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Opposition- based simulated kalman filters and their application in system identification by Kamil Zakwan, Mohd Azmi

    Published 2017
    “…Among the various kinds of optimization algorithms, Simulated Kalman Filter (SKF) is a new population-based optimization algorithm inspired by the estimation capability of Kalman Filter. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Smoothed functional algorithm with norm-limited update vector for identification of continuous-time fractional-order Hammerstein Models by Mok, Ren Hao, Mohd Ashraf, Ahmad

    Published 2024
    “…In particular, the standard smoothed functional algorithm (SFA) based method is modified by implementing a limit function in the update vector of the standard SFA based method to solve the issue of high tendency of divergence during the identification process. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    Linear-PSO with binary search algorithm for DNA Motif Discovery / Hazaruddin Harun by Harun, Hazaruddin

    Published 2015
    “…Particle Swarm Optimisation (PSO) was selected as the base algorithm that needs improvement and integration with other techniques. …”
    Get full text
    Get full text
    Book Section
  16. 16

    System identification using Extended Kalman Filter by Alias, Ahmad Hafizi

    Published 2017
    “…System identification is getting more intensive from researcher to develop an algorithm with work efficiently and more accurate. …”
    Get full text
    Get full text
    Student Project
  17. 17

    A Pixel Matching Process And Multiples Roi For Stereo Images In Stereo Vision Application by Hamzah, Rostam Affendi, Salleh, Azahari, A Aziz, Khairul Azha, Mohammed Napiah, Zul Atfyi Fauzan

    Published 2011
    “…The algorithm uses Sum of Absolute Differences (SAD) which is developed using Matlab software. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Linear-pso with binary search algorithm for DNA motif discovery / Hazaruddin Harun by Harun, Hazaruddin

    Published 2015
    “…Particle Swarm Optimisation (PSG) was selected as the base algorithm that needs improvement and integration with other techniques. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Black hole algorithm along edge detector and circular hough transform based iris projection with biometric identification systems by Tara Othman Qadir, Tara Othman Qadir, N.S.A.M Taujuddin, N.S.A.M Taujuddin

    Published 2024
    “…In this study, we presented a Black Hole Algorithm (BHA) along the Canny edge detector and circular Hough transform-based optimization technique for circular parameter identification of iris segmentation. …”
    Get full text
    Get full text
    Article
  20. 20

    Edge Detection Algorithm For Image Processing Of Search And Rescue Robot by A/L Sivem, Prasanthran

    Published 2016
    “…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
    Get full text
    Get full text
    Final Year Project