Search Results - (( processes specification method algorithm ) OR ( process identification method algorithm ))
Search alternatives:
- processes specification »
- process identification »
- identification method »
- specification method »
- method algorithm »
-
1
Simulated real-time controller for tuning algorithm using modified hill climbing approach
Published 2014“…Although all adaptive control tuning methodologies depend partially or completely on online plant system identification, the proposed method uses only the model that is used to design the original controller, leading to simplified calculations that require neither high processing power nor long processing time, as opposed to identification techniques calculations. …”
Get full text
Get full text
Thesis -
2
Topic identification using filtering and rule generation algorithm for textual document
Published 2015“…Most existing topic identification methods depend on occurrence of terms in the text. …”
Get full text
Get full text
Get full text
Thesis -
3
Development of fault detection, diagnosis and control system identification using multivariate statistical process control (MSPC)
Published 2006“…Efficient process fault detection and diagnosis in processes is important to reduce the cost of producing products with undesired specifications. …”
Get full text
Get full text
Monograph -
4
Simultaneous Computation of Model Order and Parameter Estimation for System Identification Based on Gravitational Search Algorithm
Published 2015“…In this paper, a technique termed as Simultaneous Model Order and Parameter Estimation (SMOPE), which is specifically based on Gravitational Search Algorithm (GSA) is proposed to combine model order selection and parameter estimation in one process. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri
Published 2025“…However, the testing process itself can inadvertently introduce new defects that may go undetected by subsequent inspection methods such as manual and visual inspection. …”
Get full text
Get full text
Get full text
Thesis -
6
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…Optimization algorithms are widely used for the identification of intrusion. …”
Get full text
Get full text
Get full text
Article -
7
A single measurement of combined Direct and indirect MPPT algorithm for mismatch PV module application / Mohd Najib Mohd Hussain
Published 2016“…A novel of combination direct and indirect (CoDId) MPPT algorithm is implemented for solving mismatch losses from existing PV system by employing the implementation of system identification approach. …”
Get full text
Get full text
Thesis -
8
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
Get full text
Get full text
Get full text
Thesis -
9
Systematic design of chemical reactors with multiple stages via multi-objective optimization approach
Published 2015Get full text
Get full text
Conference or Workshop Item -
10
A preliminary study on automated freshwater algae recognition and classification system / Hayat Mansoor Abdullah
Published 2012“…Experiment for comparison between manual process identification by experts with automated recognition process performed by system. …”
Get full text
Get full text
Thesis -
11
A subject identification method based on term frequency technique
Published 2017“…In this paper, a subject identification method which is based on term frequency to categorize groups of text into a particular subject is proposed. …”
Get full text
Get full text
Get full text
Article -
12
Human identification at a distance using body shape information
Published 2013“…The developed system is only applicable for recognizing a person from its frontal view and specifically constrained to male gender to simplify the algorithm. …”
Get full text
Get full text
Get full text
Article -
13
An assessment of sedimentation in Terengganu River, Malaysia using satellite imagery
Published 2023Article -
14
-
15
Advanced Processing of UPM-APSB’s AISA Airborne Hyperspectral Images for Individual Timber Species Identification and Mapping
Published 2007“…Special attention is paid to techniques that circumvent the curse of dimensionality introduced by high-dimensional data spaces. Image processing was carried out in two steps, namely data conversion from radiance units to reflectance using a radiative transfer method and application of the mapping algorithm, specifically designed for identifying superficial materials based on similarities between image pixels and spectra from a spectral library of timber species. …”
Get full text
Get full text
Get full text
Article -
16
Projecting named entity tags from a resource rich language to a resource poor language
Published 2012“…Named Entity Recognition (NER) is the identification of words in text that correspond to a pre-defined taxonomy such as person, organization, location, date, time, etc.This article focuses on the person (PER), organization (ORG) and location (LOC) entities for a Malay journalistic corpus of terrorism.A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism.The English corpus is the translated version of the Malay corpus.Hence, these two corpora are treated as parallel corpora. …”
Get full text
Get full text
Get full text
Article -
17
Projecting named entity tags from a resource rich language to a resource poor language
Published 2013“…This article focuses on the person (PER), organization (ORG) and location (LOC) entities for a Malay journalistic corpus of terrorism. A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism. …”
Get full text
Get full text
Article -
18
Projecting named entity tags from a resource rich language to a resource poor language
Published 2013“…This article focuses on the person (PER), organization (ORG) and location (LOC) entities for a Malay journalistic corpus of terrorism. A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism. …”
Get full text
Get full text
Article -
19
Projecting named entity tags from a resource rich language to a resource poor language
Published 2013“…This article focuses on the person (PER), organization (ORG) and location (LOC) entities for a Malay journalistic corpus of terrorism. A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism. …”
Get full text
Get full text
Article -
20
