Search Results - (( sequence identification system algorithm ) OR ( using optimization method algorithm ))
Search alternatives:
- sequence identification »
- identification system »
- system algorithm »
- method algorithm »
-
1
Particle swarm optimization with deep learning for human action recognition
Published 2021“…The features are reduced using the particle swarm optimization detection technique in video image sequences to reduce the computational complexity. …”
Get full text
Get full text
Article -
2
Direct Adaptive Predictive Control For Wastewater Treatment Plant
Published 2012“…The adaptive control structure is based on the linear model of the process and combined with numerical algorithm for subspace state space system identification (N4SID). …”
Get full text
Get full text
Conference or Workshop Item -
3
-
4
Enhancing counterfeit tag detection for RFID system using slotted aloha
Published 2021“…The track sequence number (TSN) was integrated with the time of arrival (TOA) at the detection stage to check the sequence process for the entire system from one stage to another, thus giving the system the capability to uniquely differentiate between counterfeit tag and the genuine tag. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Parallel implementation of genomic sequences classification using modified gabor wavelet transform on multicore systems
Published 2012“…This paper presents the parallel implementation of the gene and exon identification of DNA sequences using the previously developed modified Gabor wavelet transform on multicore systems. …”
Get full text
Get full text
Proceeding Paper -
6
-
7
SYSTEM IDENTIFICATION AND MODEL PREDICTIVE CONTROL FOR INTERACTING SERIES PROCESS WITH NONLINEAR DYNAMICS
Published 2009“…Several important issues in the identification process and real-time implementation of model predictive control algorithm are also discussed. …”
Get full text
Get full text
Thesis -
8
-
9
Fingerprint recognition system
Published 2005“…Fingerprint recognition is the oldest method which has been used in numerous applications for identification purpose in many social conditions such as access control and crime investigation.Now a day,in the era of technology the system is still using the password or smart card as an identity character for identification purpose.The problems happen when user forgot their password or lost their smart card. …”
Get full text
Get full text
Undergraduates Project Papers -
10
Kalman filter based impedance parameter estimation for transmission line and distribution line
Published 2019“…However, this is not true for certain low voltage systems or systems with short lines. In these cases, for transmission lines that are not fully transposed, the three sequence networks will be mutually coupled. …”
Get full text
Get full text
Thesis -
11
NARX modelling for steam distillation pilot plant using binary particle swarm optimisation technique / Najidah Hambali
Published 2019“…A system identification in control engineering field is a mathematical model based on dynamic properties of the system. …”
Get full text
Get full text
Thesis -
12
Application of genetic algorithm methods to optimize flowshop sequencing problem
Published 2008“…Genetic algorithm method was one of the methods that were widely used in solving optimization problem. …”
Get full text
Get full text
Undergraduates Project Papers -
13
Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan
Published 2018“…Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods. …”
Get full text
Get full text
Thesis -
14
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
Get full text
Get full text
Thesis -
15
-
16
Wind farm reactive power optimization by using imperialist competitive algorithm
Published 2013“…In this paper a new evolutionary computing method based on imperialist competitive algorithm (ICA) is used for optimization of the reactive power in a wind farm. …”
Get full text
Get full text
Conference or Workshop Item -
17
SA-EVPS ALGORITHM FOR DISCRETE SIZE OPTIMIZATION OF THE 582-BAR SPATIAL TRUSS STRUCTURE
Published 2023“…Nowadays, approximate optimization methods are widely used. This study utilized the Self Adaptive Enhanced Vibrating Particle System (SA-EVPS) algorithm as an approximate optimization method, since the EVPS algorithm requires experimental parameters. …”
Get full text
Get full text
Article -
18
VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern
Published 2012“…Two methods of optimization are used for CBLL. They are Cross Entropy and also Genetic Algorithm. …”
Get full text
Get full text
Thesis -
19
Wind Farm Reactive Power Optimization by Using Imperialist Competitive Algorithm
Published 2013“…In this paper a new evolutionary computing method based on imperialist competitive algorithm (ICA) is used for optimization of the reactive power in a wind farm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Firefly algorithm for optimal sizing of Standalone Photovoltaic System / Nurizzati Abdul Aziz
Published 2016“…Therefore, optimization methods are often used in the sizing algorithms for such systems. …”
Get full text
Get full text
Thesis
