Search Results - (( program implementation using algorithm ) OR ( based identification system algorithm ))
Search alternatives:
- program implementation »
- identification system »
- implementation using »
- based identification »
- system algorithm »
- using algorithm »
-
1
Discrete-time system identification using genetic algorithm with single parent-based mating technique
Published 2024“…The methodology encompasses data acquisition, GA program development, SPM technique implementation, and simulation using MATLAB. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Raspberry Pi-Based Finger Vein Recognition System Using PCANet
Published 2018“…For classification, k-Nearest Neighbours (kNN) with Euclidean distance algorithm is implemented. An enhancement version for kNN algorithm, k-General Nearest Neighbours (kGNN) have been proposed at initial stage. …”
Get full text
Get full text
Monograph -
3
A single measurement of combined Direct and indirect MPPT algorithm for mismatch PV module application / Mohd Najib Mohd Hussain
Published 2016“…A novel of combination direct and indirect (CoDId) MPPT algorithm is implemented for solving mismatch losses from existing PV system by employing the implementation of system identification approach. …”
Get full text
Get full text
Thesis -
4
A Framework for Green Energy Resources Identification and Integration Supported by Real-Time Monitoring, Control, and Automation Applications
Published 2025“…The proposed method demonstrated a 69.01 % alignment when validated against the weighted sum method. Following site identification, an improved Geographical Information System-driven fuzzy Traveling Salesman Problem-Binary Integer Programming algorithm was proposed to integrate these sites into a reliable ring-based system topology, aiming to achieve a zero-carbon footprint. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Fault detection and diagnosis using rule-based support system on fatty acid fractionation column
Published 2003“…Process history based methods (rule-based feature extraction) is used to implement the FDD rule-based support system. …”
Get full text
Get full text
Article -
6
-
7
Development of a Production Planning and Control Software in Total Productivity Maintenance Environment
Published 2004“…A TPM based software program has been developed to ease the process of production planning and control in TPM environment by executing sequential methodology such as problem identification, literature review, problem formulation, data coliection, company operation review, flow chart system and program algorithm before test run in the company. …”
Get full text
Get full text
Thesis -
8
Deep learning model for 5W (What, When, Where, Who, and Why) sign language translation system / Raihah Aminuddin, Ummu Mardhiah Abdul Jalil and Norsyamimi Hasran
Published 2023“…This research presents a 5W sign language identification system based on the Convolutional Neural Network technique and the You Only Look Once algorithm. …”
Get full text
Get full text
Get full text
Book Section -
9
HUMAN MOOD DETECTOR BY USING DIGITAL IMAGE PROCESSING
Published 2006“…These distinct criteria will he used to develop an algorithm that differentiates all the three emotions described before. …”
Get full text
Get full text
Final Year Project -
10
An AI-based mental health and loneliness support plushie
Published 2025“…Concerning areas like data privacy, ethical use, algorithmic prejudice, and AI's inability to completely duplicate human empathy must be addressed. …”
Get full text
Get full text
Book Section -
11
Recursive Subspace Identification Algorithm Using The Propagator Based Method
Published 2017“…In this paper, the recursive subspace identification algorithm based on the propagator method which avoids the SVD computation is proposed. …”
Get full text
Get full text
Get full text
Article -
12
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…System identification is a method of determining a mathematical relation between variables and terms of a process based on observed input-output data. …”
Get full text
Get full text
Get full text
Article -
13
Identification of continuous-time hammerstein system using sine cosine algorithm
Published 2019“…This paper presents the development of identification of continuous-time Hammerstein systems based on Sine Cosine Algorithm (SCA). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Simultaneous Computation of Model Order and Parameter Estimation for System Identification Based on Gravitational Search Algorithm
Published 2015“…System identification is a technique used to obtain a mathematical model of a system by performing analysis of input-output characteristic of the system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Smoothed functional algorithm with norm-limited update vector for identification of continuous-time fractional-order Hammerstein Models
Published 2024“…Moreover, three experiments of the Hammerstein model identification based on a numerical example, an actual twin-rotor system, and an actual flexible manipulator system were carried out in this study to verify the effectiveness of the proposed NL-SFA-based method. …”
Get full text
Get full text
Get full text
Article -
16
Statistical computing for forensic firearm pattern identification: Evaluating a fisher linear discriminant analysis-based algorithm against fixed-impulse noise
Published 2025“…Forensic laboratories analyze firearm-related evidence utilizing established ballistic identification systems such as the Integrated Ballistic Identification System (IBIS), Advanced Ballistics Analysis System (ALIAS), EVOFINDER Automated Ballistic Identification System, and CONDOR Ballistic Identification System. …”
Get full text
Get full text
Get full text
Article -
17
Hybrid DE-PEM algorithm for identification of UAV helicopter
Published 2014“…Originality/value – This study presents a novel hybrid algorithm for system identification of an autonomous helicopter model.…”
Get full text
Get full text
Get full text
Article -
18
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
Get full text
Get full text
Thesis -
19
Thermoelectric cooler identification based on continuous-time hammerstein model using metaheuristics algorithm
Published 2021“…This paper presents the identification of the Thermoelectric Cooler (TEC) plant using a novel metaheuristic called hybrid Multi-Verse Optimizer with Sine Cosine Algorithm (hMVOSCA) based continuous-time Hammerstein model. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Iterative closed-loop identification of MIMO systems using ARX-based Leaky Least Mean Square Algorithm
Published 2014Get full text
Get full text
Conference or Workshop Item
