Search Results - (( simulation identification using algorithm ) OR ( java application search algorithm ))

Refine Results
  1. 1

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
    Get full text
    Get full text
    Journal
  3. 3

    An Effective Fast Searching Algorithm for Internet Crawling Usage by Chia, Zhen Hon, Nor Azhar, Ahmad

    Published 2016
    “…The search algorithm is a crucial part in any internet applications. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Identification algorithms of flexible structure using neural networks by Ismail, R., Ismail, A. Y., Mat Darus, I. Z.

    Published 2006
    “…The finite duration step input is applied to simulation algorithm of the plate. Finally a comparative performance of the approaches used is presented and discussed.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    A Robust Firearm Identification Algorithm of Forensic Ballistics Specimens by Z. L., Chuan, A. A., Jemain, C-Y, Liong, N. A. M., Ghani, L. K., Tan

    Published 2017
    “…Therefore, the aim of this study is to propose a robust algorithm for a firearm identification based on extracting a set of informative features from the segmented region of interest (ROI) using the simulated noisy center-firing pin impression images. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Opposition- based simulated kalman filters and their application in system identification by Kamil Zakwan, Mohd Azmi

    Published 2017
    “…Among the various kinds of optimization algorithms, Simulated Kalman Filter (SKF) is a new population-based optimization algorithm inspired by the estimation capability of Kalman Filter. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Date store management in sliding window based on-line identification algorithms by Asirvadam , Vijanth Sagayan, McLoone, Sean, Irwin, George W

    Published 2001
    “…Sliding window identification algorithms use information from a store of data to optimise on-line learning. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Simultaneous computation of model order and parameter estimation for system identification based on opposition-based simulated Kalman filter by Badaruddin, Muhammad, Kamil Zakwan, Mohd Azmi, Zuwairie, Ibrahim, Ahmad Afif, Mohd Faudzi, Pebrianti, Dwi

    Published 2018
    “…Simultaneous Model Order and Parameter Estimation (SMOPE) has been proposed to address system identification problem efficiently using optimization algorithms. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Identification of hammerstain model using stochastic perturbation simultaneous approximation by Nurriyah, Mohd Noor

    Published 2016
    “…Furthermore, the Identification is done using MATLAB Simulink to simulate the Hammerstein Model. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali by Mohd Razali, Ainaa Farhanah

    Published 2022
    “…The system algorithm is verified and validates on two sloped bumps surface topographies that have been simulated using MATLAB software and measured using the Alicona Infinite Focus Measurement (IFM) device, respectively. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Simultaneous Computation of Model Order and Parameter Estimation for System Identification Based on Gravitational Search Algorithm by Kamil Zakwan, Mohd Azmi, Pebrianti, Dwi, Zuwairie, Ibrahim, Shahdan, Sudin, Sophan Wahyudi, Nawawi

    Published 2015
    “…System identification is a technique used to obtain a mathematical model of a system by performing analysis of input-output characteristic of the system. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification by Abd Samad, Md Fahmi

    Published 2011
    “…A deterministic mutation-based algorithm is introduced to overcome this problem. Identification studies using NARX (Nonlinear AutoRegressive with eXogenous input) models employing simulated systems and real plant data are used to demonstrate that the algorithm is able to detect significant variables and terms faster and to select a simpler model structure than other well-known EC methods.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Hazard identification on fractionation column using rule based expert system by Mohd Yunus, Mohd Yusri, Ali, Mohamad Wijayanuddin

    Published 2001
    “…The process-specific knowledge, which consists of process operation data and the process flow sheet, has been constructed using a HYSIS process simulator. The process-general knowledge which consists of rule-based expert system is developed from simulation result obtained from HYSIS process simulator. …”
    Get full text
    Get full text
    Article
  19. 19

    Identification of microcalcification in mammographic images / Noor Azliza Abdul Shauti by Abdul Shauti, Noor Azliza

    Published 2008
    “…By using this identification, it can simulate in flexible images post processing and analysis in easy image management using Java aplication. …”
    Get full text
    Get full text
    Thesis
  20. 20

    MULTIVARIABLE CLOSED-LOOP SYSTEM IDENTIFICATION USING ITERATIVE LEAKY LEAST MEAN SQUARES METHOD by MOHAMED OSMAN, MOHAMED ABDELRAHIM

    Published 2017
    “…In this thesis. iterative Leaky Least Mean Squares (LLMS) based methods are proposed to address the limitations ofLS method in MultiInput Multi-Output (MIMO) closed-loop system identification. In this research. novel algorithms have been developed to: (I) isolate the less interacting channe Is using a modified partial correlation algorithm. (2) achieve unbiased and consistent parameter estimates using an iterative LLMS algorithm and (3) develop parsimonious models for closed-loop MIMO systems. …”
    Get full text
    Get full text
    Thesis