Search Results - (( using based methods algorithm ) OR ( software identification method algorithm ))

Refine Results
  1. 1

    Three phase fault algorithm in distribution system by using database approach and impedance based method by Shamsudin, N.H., Latiff, A.A., Abas, N., Mokhlis, Hazlie, Awalin, L.J.

    Published 2012
    “…A three phase fault location algorithm using database and impedance based method is utilized in distribution system to locate fault which may occur in any possible fault sections and to optimize the switching operations to reduce the outage time affected by fault. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Register Transfer Level Implementation Of Pooling - Based Feature Extraction For Finger Vein Identification by Mohamed Ali, Mohamed Hassan

    Published 2017
    “…The proposed algorithm extracted the local feature information of the finger vein pattern (patches), and used these patches to improve the robustness of the identification. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Weighted Sum-Dijkstra’s Algorithm in Best Path Identification based on Multiple Criteria by Ting, Kien Hua, Noraini Abdullah

    Published 2018
    “…In order to achieve the objective, Weighted Sum-Dijkstra’s Algorithm (WSDA), a combination method between WSM and Dijkstra’s Algorithm is applied to solve multiple criteria network problems. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Edge Detection Algorithm For Image Processing Of Search And Rescue Robot by A/L Sivem, Prasanthran

    Published 2016
    “…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    System identification using Extended Kalman Filter by Alias, Ahmad Hafizi

    Published 2017
    “…In order to evaluate the performance of the EKF learning algorithm, the proposed algorithm validation were analyzed using model validation methods as a checker such as One Step Ahead (OSA) and correlation coefficient (R2). …”
    Get full text
    Get full text
    Student Project
  6. 6

    Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali by Mohd Razali, Ainaa Farhanah

    Published 2022
    “…The system algorithm is verified and validates on two sloped bumps surface topographies that have been simulated using MATLAB software and measured using the Alicona Infinite Focus Measurement (IFM) device, respectively. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Improved intrusion detection algorithm based on TLBO and GA algorithms by Aljanabi, Mohammad, Mohd Arfian, Ismail

    Published 2021
    “…Optimization algorithms are widely used for the identification of intrusion. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Taguchi's method for optimized neural network based autoreclosure in extra high voltage lines by K.S.R., Rao, Z.F., Desta

    Published 2008
    “…The fault identification prior to reclosing is based on optimized artificial neural network associated with Levenberg Marquardt algorithm to train the ANN and Taguchi's Method to find optimal parameters of the algorithm and number of hidden neurons. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Comparative Study of Weighted Product–Dijkstra’s Algorithm and All Possible Path Approach Based on Multiple Criteria and Multi-Dimensions by Ting Kien Hua, Noraini Abdullah

    Published 2020
    “…All Possible Path Algorithm (APPA) was another algorithm that was also used to rank all the alternatives path based on multiple criteria. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Autoreclosure in Extra High Voltage Lines using Taguchi’s Method and Optimized Neural Networks by Desta, Zahlay F., K.S., Ramarao, Taj, Mohammed Baloch

    Published 2008
    “…The fault identification prior to reclosing is based on optimized artificial neural network associated with standard Error Back-Propagation, Levenberg Marquardt Algorithm and Resilient Back-Propagation training algorithms together with Taguchi’s Method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Autoreclosure in Extra High Voltage Lines using Taguchi's Method and Optimized Neural Networks by Desta, Zahlay F., K.S., Rama Rao

    Published 2009
    “…The fault identification prior to reclosing is based on optimized artificial neural network associated with standard Error Back-Propagation, Levenberg Marquardt Algorithm and Resilient Back-Propagation training algorithms together with Taguchi’s Method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Cabbage disease detection system using k-NN algorithm by Mohamad Ainuddin Sahimat

    Published 2022
    “…Finally, the KNN algorithm will be used to classify the disease based on sample nature and a cabbage disease data set. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  14. 14
  15. 15

    Detecting problematic vibration on unmanned aerial vehicles via genetic-algorithm methods by Mohd Sharif, Zakaria, Mohammad Fadhil, Abas, Fatimah, Dg Jamil, Norhafidzah, Mohd Saad, Addie, Irawan, Pebrianti, Dwi

    Published 2024
    “…The fitness function with the Genetic Algorithm (GA) optimization method is tested and evaluated based on Root Mean Squared Error (RMSE), Mean Absolute Percentage Error (MAPE), and detection time. 51 sets of data have been collected using software in the loop (SITL) methods and are used to determine the effectiveness of the proposed fitness function and GA. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Autoreclosure in extra high voltage lines using taguchi's method and optimized neural networks by K.S.R, Rao, F. D., Zahlay

    Published 2008
    “…The fault identification prior to reclosing is based on optimized artificial neural network associated with standard Error Back-Propagation, Levenberg Marquardt Algorithm and Resilient Back-Propagation training algorithms together with Taguchi's Method. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Topic identification method for textual document by Jamil, Nurul Syafidah, Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2017
    “…This paper proposes a topic identification method that filters the important terms from the preprocessed text and applied term weighting scheme to solve synonym problem.A rule generation algorithm is used to determine the appropriate topics based on the weighted terms.The text document used in the experiment is the English translated Quran.The topics identified from the proposed method were compared with topics identified using Rough Set and domain experts. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Detecting problematic vibration on unmanned aerial vehicles via genetic-algorithm methods by Zakaria, Mohd Sharif, Abas, Mohammad Fadhil, Dg Jamil, Fatimah, Mohd Saad, Norhafidzah, Hashim, Addie Irawan, Pebrianti, Dwi

    Published 2024
    “…The fitness function with the Genetic Algorithm (GA) optimization method is tested and evaluated based on Root Mean Squared Error (RMSE), Mean Absolute Percentage Error (MAPE), and detection time. 51 sets of data have been collected using software in the loop (SITL) methods and are used to determine the effectiveness of the proposed fitness function and GA. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Fingerprint recognition system by Rohani, Abu Bakar

    Published 2005
    “…Fingerprint recognition is the oldest method which has been used in numerous applications for identification purpose in many social conditions such as access control and crime investigation.Now a day,in the era of technology the system is still using the password or smart card as an identity character for identification purpose.The problems happen when user forgot their password or lost their smart card. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    Dynamic characterisation of an exhaust system / Abdul Rani Muhamad Norhisham … [et al.] by Muhamad Norhisham, Abdul Rani, Mat Isa, Ahmad Azlan, Abdul Rahman, Zuriah, Ali Al-Assadi, Hayder M. A.

    Published 2011
    “…The results are then validated through simulation model using the Finite Element Method via commercially available software. …”
    Get full text
    Get full text
    Get full text
    Article