Search Results - (( simulation identification system algorithm ) OR ( java applications using algorithm ))
Search alternatives:
- simulation identification »
- identification system »
- applications using »
- java applications »
- system algorithm »
- using algorithm »
-
1
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
2
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. The first and second proposed methods were incorporated into the proposed Background Pass-Go (BPG) system and Visual Identification Protocol Professional (VIP Pro) system respectively. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
3
-
4
Opposition- based simulated kalman filters and their application in system identification
Published 2017“…The COOBSKF also has been compared with five other optimization algorithms and outperforms them all. Besides that, this thesis also presents the application of COOBSKF in a system identification problem. …”
Get full text
Get full text
Thesis -
5
Iterative closed-loop identification of MIMO systems using ARX-based Leaky Least Mean Square Algorithm
Published 2014“…Closed-loop identification of MIMO systems is considered. An iterative Leaky Least Mean Squares (LLMS) algorithm is proposed for the development of ARX structure. …”
Get full text
Get full text
Conference or Workshop Item -
6
Identification algorithms of flexible structure using neural networks
Published 2006“…This paper present an investigation into the development of identification system approaches for dynamic modelling characterization of a two dimensional flexible plate structures. …”
Get full text
Get full text
Conference or Workshop Item -
7
Simultaneous Computation of Model Order and Parameter Estimation for System Identification Based on Gravitational Search Algorithm
Published 2015“…From the simulation, it is proven that the proposed method can be an alternative technique for solving the system identification problem. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Simultaneous computation of model order and parameter estimation for system identification based on opposition-based simulated Kalman filter
Published 2018“…Simultaneous Model Order and Parameter Estimation (SMOPE) has been proposed to address system identification problem efficiently using optimization algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…A deterministic mutation-based algorithm is introduced to overcome this problem. Identification studies using NARX (Nonlinear AutoRegressive with eXogenous input) models employing simulated systems and real plant data are used to demonstrate that the algorithm is able to detect significant variables and terms faster and to select a simpler model structure than other well-known EC methods.…”
Get full text
Get full text
Get full text
Article -
10
Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali
Published 2022“…The results of the verification of the system algorithm on the simulated 3D areal surface topography of a sloped bumps shows that the system algorithm can effectively identified the edges features and segmented them following the shape partem of the surface features of the sloped bumps. …”
Get full text
Get full text
Thesis -
11
Identification algorithms of flexible structure using neural networks
Published 2009Get full text
Article -
12
Identification of hammerstain model using stochastic perturbation simultaneous approximation
Published 2016“…Furthermore, the Identification is done using MATLAB Simulink to simulate the Hammerstein Model. …”
Get full text
Get full text
Undergraduates Project Papers -
13
Hazard identification on fractionation column using rule based expert system
Published 2001“…The algorithm is found applicable for any of process system, however the expert system developed is only limited to the application for fractionation column of oleo chemical plant.…”
Get full text
Get full text
Article -
14
MULTIVARIABLE CLOSED-LOOP SYSTEM IDENTIFICATION USING ITERATIVE LEAKY LEAST MEAN SQUARES METHOD
Published 2017“…In this thesis. iterative Leaky Least Mean Squares (LLMS) based methods are proposed to address the limitations ofLS method in MultiInput Multi-Output (MIMO) closed-loop system identification. In this research. novel algorithms have been developed to: (I) isolate the less interacting channe Is using a modified partial correlation algorithm. (2) achieve unbiased and consistent parameter estimates using an iterative LLMS algorithm and (3) develop parsimonious models for closed-loop MIMO systems. …”
Get full text
Get full text
Thesis -
15
Date store management in sliding window based on-line identification algorithms
Published 2001Get full text
Get full text
Conference or Workshop Item -
16
Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification
Published 2007“…The genetic algorithm approach is widely recognized as an effective and flexible optimization method for system identification. …”
Get full text
Get full text
Article -
17
Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification
Published 2007“…he genetic algorithm approach is widely recognized as an effective and flexible optimization method for system identification. …”
Get full text
Get full text
Article -
18
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
19
Simulated real-time controller for tuning algorithm using modified hill climbing approach
Published 2014“…Often, it is necessary to calibrate a certain parameters of a control system due to plant parameters fluctuation over time.In this research, an intelligent algorithmic tuning technique suitable for realtime system tuning based on hill climbing optimization algorithm and model reference adaptive control system (MRAC) technique is proposed. …”
Get full text
Get full text
Thesis -
20
Estimation in spot welding parameters using genetic algorithm
Published 2007“…In this study, parameter of spot welding estimate using computer simulation. System identification is the field of modeling a system from experiment or simulation data. …”
Get full text
Get full text
Thesis
