Search Results - (( system implementation function algorithm ) OR ( data validation using algorithm ))

Refine Results
  1. 1

    Feature fusion using a modified genetic algorithm for face and signature recognition system by Suryanti, Awang

    Published 2015
    “…Several approaches and benchmark data were used to validate the effectiveness of the proposed method compared to the unimodal system and normal feature selection method. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Breast cancer disease classification using fuzzy-ID3 algorithm based on association function by Nur Farahaina, Idris, Mohd Arfian, Ismail, Mohd Saberi, Mohamad, Shahreen, Kasim, Zalmiyah, Zakaria, Sutikno, Tole

    Published 2022
    “…The FID3-AF algorithm is a hybridisation of the fuzzy system, the iterative dichotomizer 3 (ID3) algorithm, and the association function. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Wifi4U: Broadband recommendation system by using rule-based and cosine similarity / Putri Nur Syarfa Maizan by Maizan, Putri Nur Syarfa

    Published 2020
    “…Furthermore, we aim to visualize the information of home and business broadband in Malaysia. In this system, Forward Chaining in Rule-Based algorithm is used to filter user’s preferences and Web-Scraping technique is used to extract data and information from websites. …”
    Get full text
    Get full text
    Thesis
  4. 4

    State estimation of the power system using robust estimator by Khan, Z., Razali, R.B., Daud, H., Nor, N.M., Firuzabad, M.F.

    Published 2016
    “…The presence of gross errors in the process data for the power system state estimation (PSSE) algorithm is very crucial as they may severely degrade its results. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Discovering decision algorithm from a distance relay event report by Othman, Mohammad Lutfi, Aris, Ishak, Abdullah, Senan Mahmood, Ali, Md. Liakot, Othman, Mohammad Ridzal

    Published 2009
    “…This derived algorithm, aptly known as relay CD-prediction rules, can later be used as a knowledge base in support of a protection system analysis expert system to predict, validate or even diagnose future unknown relay events. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Hub Angle Control for A Single Link Flexible Manipulator Based on Cuckoo Search Algorithm by aiman Azrael, Shaiful Nahar Sukri, Siti Sarah Zahidah, Nazri, Muhamad Sukri, Hadi, Annisa, Jamali, Hanim, Mohd Yatim, Intan Zaurah, Mat Darus

    Published 2021
    “…System identification was implemented via swarm intelligence algorithm known as cuckoo search algorithms based on auto regressive with exogenous model structure. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  7. 7

    Estimation of photovoltaic models using an enhanced Henry gas solubility optimization algorithm with first-order adaptive damping Berndt-Hall-Hall-Hausman method by Ramachandran, Murugan, Sundaram, Arunachalam, Ridha, Hussein Mohammed, Mirjalili, Seyedali

    Published 2024
    “…The proposed EHGSO methodology based on the adaptive damping BHHH technique (EHGSOAdBHHH) is tested on Single Diode (SD), and Double Diode (DD) PV models using actual experimental data. EHGSOAdBHHH exhibits outstanding accordance with attained experimental data compared with other algorithms, and its superiority is validated using several statistical criteria.…”
    Get full text
    Get full text
    Article
  8. 8

    Development of an algorithm for correlation of aircraft positioning data from radar and ADS-B sensors / Koh Che Hun by Koh , Che Hun

    Published 2019
    “…Based on the findings, a multi-sensor data correlation algorithm is developed. The algorithm is validated using real time radar and ADS-B data from Department of Civil Aviation Malaysia (CAAM). …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption by Nurnajmin Qasrina Ann, Ayop Azmi

    Published 2023
    “…The fitness function used is the correlation function in the SKF algorithm to optimize the cipher image produced using the Lorenz system. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Widely linear dynamic quaternion valued least mean square algorithm for linear filtering by Mohammed, Aldulaimi Haydar Imad

    Published 2017
    “…Prediction gain, tracking ability and convergence speed of the proposed algorithms are analyzed and validated experimentally by various simulations on both synthetic and real world multidimensional data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Data-driven fractional-order PID controller tuning for liquid slosh suppression using marine predators algorithm by Mohd Zaidi, Mohd Tumari, Mohd Ashraf, Ahmad, Mohd Helmi, Suid, Mohd Riduwan, Ghazali, Shahrizal, Saat

    Published 2023
    “…In response, this study introduces a data-driven fractional-order PID (FOPID) controller designed using the Marine Predators Algorithm (MPA) for suppressing liquid slosh. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Comparative study on different type of multiplier in verilog HDL: article / Nik Ahmad Afnan Nik Azman by Nik Azman, Nik Ahmad Afnan

    Published 2018
    “…To check the validity and functionality of the multiplier, Modelsim software are used. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Discrete-time system identification using genetic algorithm with single parent-based mating technique by Zainuddin, Farah Ayiesya

    Published 2024
    “…The study's results were validated using real-world data from industrial systems, including a hair dryer, an air compression system, and a flexible robot arm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Smart Routing For Solid Waste Collection by Ngiam, John Tze

    Published 2023
    “…Testing is conducted to validate the functionality and performance of the system. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  18. 18

    DESIGN AND IMPLEMENTATION OF INTELLIGENT MONITORING SYSTEMS FOR THERMAL POWER PLANT BOILER TRIPS by FIRAS BASIM, ISMAIL ALNAIMI

    Published 2011
    “…The encoding and optimization process using genetic algorithms has been applied successfully. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20