Search Results - (( processes specification method algorithm ) OR ( process identification method algorithm ))

Refine Results
  1. 1

    Simulated real-time controller for tuning algorithm using modified hill climbing approach by Ahmed, Ahmed Abdulelah

    Published 2014
    “…Although all adaptive control tuning methodologies depend partially or completely on online plant system identification, the proposed method uses only the model that is used to design the original controller, leading to simplified calculations that require neither high processing power nor long processing time, as opposed to identification techniques calculations. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Topic identification using filtering and rule generation algorithm for textual document by Nurul Syafidah, Jamil

    Published 2015
    “…Most existing topic identification methods depend on occurrence of terms in the text. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Development of fault detection, diagnosis and control system identification using multivariate statistical process control (MSPC) by Ibrahim, Kamarul 'Asri, Ahmad, Arshad, Ali, Mohamad Wijayanuddin, Mak, Weng Yee

    Published 2006
    “…Efficient process fault detection and diagnosis in processes is important to reduce the cost of producing products with undesired specifications. …”
    Get full text
    Get full text
    Monograph
  4. 4

    Simultaneous Computation of Model Order and Parameter Estimation for System Identification Based on Gravitational Search Algorithm by Kamil Zakwan, Mohd Azmi, Pebrianti, Dwi, Zuwairie, Ibrahim, Shahdan, Sudin, Sophan Wahyudi, Nawawi

    Published 2015
    “…In this paper, a technique termed as Simultaneous Model Order and Parameter Estimation (SMOPE), which is specifically based on Gravitational Search Algorithm (GSA) is proposed to combine model order selection and parameter estimation in one process. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri by Pedram , Tabatabaeemoshiri

    Published 2025
    “…However, the testing process itself can inadvertently introduce new defects that may go undetected by subsequent inspection methods such as manual and visual inspection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Improved intrusion detection algorithm based on TLBO and GA algorithms by Aljanabi, Mohammad, Mohd Arfian, Ismail

    Published 2021
    “…Optimization algorithms are widely used for the identification of intrusion. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A single measurement of combined Direct and indirect MPPT algorithm for mismatch PV module application / Mohd Najib Mohd Hussain by Mohd Hussain, Mohd Najib

    Published 2016
    “…A novel of combination direct and indirect (CoDId) MPPT algorithm is implemented for solving mismatch losses from existing PV system by employing the implementation of system identification approach. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    A preliminary study on automated freshwater algae recognition and classification system / Hayat Mansoor Abdullah by Mansoor Abdullah, Hayat

    Published 2012
    “…Experiment for comparison between manual process identification by experts with automated recognition process performed by system. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A subject identification method based on term frequency technique by Jamil, Nurul Syafidah, Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza, Ahmad, Faudziah, Che Pa, Noraziah, Wan Ishak, Wan Hussain, Din, Roshidi, Ahmad, Farzana Kabir

    Published 2017
    “…In this paper, a subject identification method which is based on term frequency to categorize groups of text into a particular subject is proposed. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Human identification at a distance using body shape information by Alang Md Rashid, Nahrul Khair, Yahya, M. F., Shafie, Amir Akramin

    Published 2013
    “…The developed system is only applicable for recognizing a person from its frontal view and specifically constrained to male gender to simplify the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    Advanced Processing of UPM-APSB’s AISA Airborne Hyperspectral Images for Individual Timber Species Identification and Mapping by Jusoff, Kamaruzaman

    Published 2007
    “…Special attention is paid to techniques that circumvent the curse of dimensionality introduced by high-dimensional data spaces. Image processing was carried out in two steps, namely data conversion from radiance units to reflectance using a radiative transfer method and application of the mapping algorithm, specifically designed for identifying superficial materials based on similarities between image pixels and spectra from a spectral library of timber species. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Projecting named entity tags from a resource rich language to a resource poor language by Zamin, Norshuhani, Oxley, Alan, Abu Bakar, Zainab

    Published 2012
    “…Named Entity Recognition (NER) is the identification of words in text that correspond to a pre-defined taxonomy such as person, organization, location, date, time, etc.This article focuses on the person (PER), organization (ORG) and location (LOC) entities for a Malay journalistic corpus of terrorism.A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism.The English corpus is the translated version of the Malay corpus.Hence, these two corpora are treated as parallel corpora. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Projecting named entity tags from a resource rich language to a resource poor language by Zamin, N., Oxley, A., Bakar, Z.A.

    Published 2013
    “…This article focuses on the person (PER), organization (ORG) and location (LOC) entities for a Malay journalistic corpus of terrorism. A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism. …”
    Get full text
    Get full text
    Article
  18. 18

    Projecting named entity tags from a resource rich language to a resource poor language by Zamin, N., Oxley, A., Bakar, Z.A.

    Published 2013
    “…This article focuses on the person (PER), organization (ORG) and location (LOC) entities for a Malay journalistic corpus of terrorism. A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism. …”
    Get full text
    Get full text
    Article
  19. 19

    Projecting named entity tags from a resource rich language to a resource poor language by Zamin, N., Oxley, A., Bakar, Z.A.

    Published 2013
    “…This article focuses on the person (PER), organization (ORG) and location (LOC) entities for a Malay journalistic corpus of terrorism. A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism. …”
    Get full text
    Get full text
    Article
  20. 20