Search Results - (( system implementation function algorithm ) OR ( data validation using algorithm ))
Search alternatives:
- implementation function »
- system implementation »
- function algorithm »
- validation using »
- data validation »
- using algorithm »
-
1
Feature fusion using a modified genetic algorithm for face and signature recognition system
Published 2015“…Several approaches and benchmark data were used to validate the effectiveness of the proposed method compared to the unimodal system and normal feature selection method. …”
Get full text
Get full text
Thesis -
2
Breast cancer disease classification using fuzzy-ID3 algorithm based on association function
Published 2022“…The FID3-AF algorithm is a hybridisation of the fuzzy system, the iterative dichotomizer 3 (ID3) algorithm, and the association function. …”
Get full text
Get full text
Get full text
Article -
3
Wifi4U: Broadband recommendation system by using rule-based and cosine similarity / Putri Nur Syarfa Maizan
Published 2020“…Furthermore, we aim to visualize the information of home and business broadband in Malaysia. In this system, Forward Chaining in Rule-Based algorithm is used to filter user’s preferences and Web-Scraping technique is used to extract data and information from websites. …”
Get full text
Get full text
Thesis -
4
State estimation of the power system using robust estimator
Published 2016“…The presence of gross errors in the process data for the power system state estimation (PSSE) algorithm is very crucial as they may severely degrade its results. …”
Get full text
Get full text
Conference or Workshop Item -
5
Discovering decision algorithm from a distance relay event report
Published 2009“…This derived algorithm, aptly known as relay CD-prediction rules, can later be used as a knowledge base in support of a protection system analysis expert system to predict, validate or even diagnose future unknown relay events. …”
Get full text
Get full text
Get full text
Article -
6
Hub Angle Control for A Single Link Flexible Manipulator Based on Cuckoo Search Algorithm
Published 2021“…System identification was implemented via swarm intelligence algorithm known as cuckoo search algorithms based on auto regressive with exogenous model structure. …”
Get full text
Get full text
Get full text
Proceeding -
7
Estimation of photovoltaic models using an enhanced Henry gas solubility optimization algorithm with first-order adaptive damping Berndt-Hall-Hall-Hausman method
Published 2024“…The proposed EHGSO methodology based on the adaptive damping BHHH technique (EHGSOAdBHHH) is tested on Single Diode (SD), and Double Diode (DD) PV models using actual experimental data. EHGSOAdBHHH exhibits outstanding accordance with attained experimental data compared with other algorithms, and its superiority is validated using several statistical criteria.…”
Get full text
Get full text
Article -
8
Development of an algorithm for correlation of aircraft positioning data from radar and ADS-B sensors / Koh Che Hun
Published 2019“…Based on the findings, a multi-sensor data correlation algorithm is developed. The algorithm is validated using real time radar and ADS-B data from Department of Civil Aviation Malaysia (CAAM). …”
Get full text
Get full text
Get full text
Thesis -
9
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…The fitness function used is the correlation function in the SKF algorithm to optimize the cipher image produced using the Lorenz system. …”
Get full text
Get full text
Thesis -
10
Widely linear dynamic quaternion valued least mean square algorithm for linear filtering
Published 2017“…Prediction gain, tracking ability and convergence speed of the proposed algorithms are analyzed and validated experimentally by various simulations on both synthetic and real world multidimensional data. …”
Get full text
Get full text
Get full text
Thesis -
11
Data-driven fractional-order PID controller tuning for liquid slosh suppression using marine predators algorithm
Published 2023“…In response, this study introduces a data-driven fractional-order PID (FOPID) controller designed using the Marine Predators Algorithm (MPA) for suppressing liquid slosh. …”
Get full text
Get full text
Get full text
Article -
12
Comparative study on different type of multiplier in verilog HDL: article / Nik Ahmad Afnan Nik Azman
Published 2018“…To check the validity and functionality of the multiplier, Modelsim software are used. …”
Get full text
Get full text
Article -
13
Generation of new low-complexity March algorithms for optimum faults detection in SRAM
Published 2023“…In contrast, March algorithms with lower complexity can be used to reduce test costs and chip area overhead. …”
Get full text
Get full text
Get full text
Article -
14
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
15
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Discrete-time system identification using genetic algorithm with single parent-based mating technique
Published 2024“…The study's results were validated using real-world data from industrial systems, including a hair dryer, an air compression system, and a flexible robot arm. …”
Get full text
Get full text
Get full text
Thesis -
17
Smart Routing For Solid Waste Collection
Published 2023“…Testing is conducted to validate the functionality and performance of the system. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
18
DESIGN AND IMPLEMENTATION OF INTELLIGENT MONITORING SYSTEMS FOR THERMAL POWER PLANT BOILER TRIPS
Published 2011“…The encoding and optimization process using genetic algorithms has been applied successfully. …”
Get full text
Get full text
Thesis -
19
A graphical user interface application for continuous-time identification of dynamical system
Published 2002“…A validation process had been implemented using cross validation process. …”
Get full text
Get full text
Get full text
Article -
20
Simulation-Based Power Estimation for High Throughput SHA-256 Design on Unfolding Transformation
Published 2022“…The algorithms are successfully designed using the Altera Quartus II platform. …”
Get full text
Get full text
Get full text
Proceeding
