Search Results - (( using action method algorithm ) OR ( using application testing algorithm ))

Refine Results
  1. 1

    STUDIES ON COMPARISON OF PROPORTIONAL ON ERROR WITH PROPORTIONAL ON MEASURED VALUE IN PID CONTROLLERS by WAN MOHD RUSHIDI, WAN AMIR HAKIMI

    Published 2019
    “… PID Controllers have different algorithms or methods in which the controller action is based on Error or Process Variable (PV). …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization by Mizher, Manar Abduljabbar Ahmad, Ang, Mei Choo, Sheikh Abdullah, Siti Norul Huda, Kok, Weng Ng

    Published 2019
    “…We then evaluated the Improved AKF algorithm with the-state-of-the-art algorithms in terms of compression ratio using Paul videos and Shih-Tang dataset. …”
    Get full text
    Get full text
    Article
  3. 3

    Prediction analysis of COVID-19 in Selangor by using Backpropagation Algorithm with Conjugate Gradient Method by Noor Amirah Ajmal Khan, Siti Mahani Marjugi

    Published 2024
    “…The Fletcher-Reeves approach can improve the efficiency of the backpropagation algorithm by having a faster convergence rate than other methods such as the scaled conjugate gradient method. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi by Rahimi, Ahmad Faris

    Published 2017
    “…Testing of the application are using 10-Fold Cross Validation technique. 90% of the data be used as a training and another 10% be used for the testing part. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Adaptive artificial neural network for power system security assessment and control action by Al-Masri, Ahmed Naufal A.

    Published 2012
    “…The proposed algorithm has been successfully tested on IEEE 9-bus test system,IEEE 39-bus test system and Peninsular Malaysia Grid 275kV for the steady-statesecurity assessment and control. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Simulation of an adaptive artificial neural network for power system security enhancement including control action by Al-Masri, Ahmed Naufal A., Ab Kadir, Mohd Zainal Abidin, Hizam, Hashim, Mariun, Norman

    Published 2015
    “…This paper presents a new method for enhancing power system security, including a remedial action, using an artificial neural network (ANN) technique. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Active force control with iterative learning control algorithm for a vehicle suspension by Rosmazi, Rosli

    Published 2013
    “…ILC algorithm is implemented into AFC-based control scheme to reduce its complexity and hence faster response, by replacing the use of artificial intelligence (Al) method as proposed by previous researcher. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Image Based Congestion Detection Algorithms And Its Real Time Implementation by Khdiar, Ahmed Nidhal

    Published 2015
    “…The methodology includes vehicle detection by using backlight pairing feature algorithm and modified Watershed algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    New Cryptographic Algorithms for Enhancing Security of Voice Data by Al-Hazaimeh, Obaida Mohammad Awad

    Published 2010
    “…The proposed solution was implemented and tested and the results showed that the required time for the security processes is minimized compared to some known algorithms such as AES_Rijndael algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Modular motor driver with torque control for gripping mechanism by How D.N.T., Baharuddin M.Z., Mohideen S.S.K., Sahari K.S.M., Anuar A.

    Published 2023
    “…In implementing the project, several algorithms were tested to achieve the torque control algorithm requirement including on-off algorithm, P algorithm, PI algorithm, PD algorithm and PID algorithm. …”
    Conference paper
  11. 11
  12. 12

    E-Hadith DV: Hadith scriptures in Syafie Madhhab retrieval using data visualization / Nor Faezahtul Salme Norhisam by Norhisam, Nor Faezahtul Salme

    Published 2020
    “…For this project, it will use Agile methodology that has five phases, which are requirement analysis phase, design phase, development phase, testing phase and maintenance. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    A simplified PID-like ANFIS controller trained by genetic algorithm to control nonlinear systems by Lutfy, Omar Farouq, Mohd Noor, Samsul Bahari, Marhaban, Mohammad Hamiruce, Abbas, Kassim A.

    Published 2010
    “…Moreover, the GA was used to find the optimal settings for the input and output scaling factors for this controller, instead of the widely used trial and error method. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Graphical user interface test case generation for android apps using Q-learning / Husam N. S. Yasin by Husam , N. S. Yasin

    Published 2021
    “…It is a fully automated black-box testing approach that uses Upper Confidence Bound (UCB) exploration-exploitation strategy to generate actions that visit unexplored states of the app and uses the execution of the app on the generated actions to construct a state-transition model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    A fuzzy approach for early human action detection / Ekta Vats by Ekta, Vats

    Published 2016
    “…Most existing methods deal with the detection of an action after its completion. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Smartphone based wound shape measurement / Muhammad Azlan Othman by Othman, Muhammad Azlan

    Published 2016
    “…This application can be improved its accuracy by implement a better segmentation method and algorithm.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Resource management for W-CDMA systems using artificial neural network / Siti Rahmah Tukiran by Tukiran, Siti Rahmah

    Published 2008
    “…This method is chosen since it is the fastest technique that can be used to produce a successful result.…”
    Get full text
    Get full text
    Thesis
  20. 20

    Enhanced Distributed Learning Classifier System For Simulated Mobile Robot Behaviours by Baneamoon, Saeed Mohammed Saeed

    Published 2010
    “…A Distributed Learning Classifier System (DLCS) consisting of five Learning Classifier Systems (LCS) with hierarchical architecture of three levels is used. An enhanced Bucket Brigade Algorithm (BBA) is developed to avoid the problem of choosing classifiers with high strength value but with incorrect behaviour. …”
    Get full text
    Get full text
    Thesis