Search Results - (( using function methods algorithm ) OR ( based observational data algorithm ))

Refine Results
  1. 1

    Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification by Abd Samad, Md Fahmi

    Published 2011
    “…System identification is a method of determining a mathematical relation between variables and terms of a process based on observed input-output data. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Evaluation of lightning return stroke current using measured electromagnetic fields by Mahdi, Izadi

    Published 2012
    “…Moreover, in the proposed method, the attenuation height dependent factor can be determined using measured field while assuming it to be an unknown function based on the engineering model. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed by Borujeni, Sattar Chavoshi

    Published 2012
    “…In recent years soft computing methods like fuzzy logic and genetic algorithm are being used in modeling complex processes of hydrologic events. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Long term energy demand forecasting based on hybrid, optimization: Comparative study by Musa, Wahab, Ku-Mahamud, Ku Ruhana, Yasin, Azman

    Published 2012
    “…The objective of this research is to develop a long term energy demand forecasting model that used hybrid optimization.To accomplish this goal, a hybrid algorithm that combined a genetic algorithm and a local search algorithm method has been developed to overcome premature convergence.Model performances of hybrid algorithm were compared with former single algorithm model in estimating parameter values of an objective function to measure the goodness-of-fit between the observed data and simulated results.Averages error between two models was adopt to select the proper model for future projection of energy demand.…”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Identification of continuous-time hammerstein system using sine cosine algorithm by E. F., Junis, J. J., Jui, Mohd Helmi, Suid, Mohd Ashraf, Ahmad

    Published 2019
    “…The SCA based method is then used to estimate the parameters in both the linear and nonlinear parts based on the given input and output data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Bayesian inference for the bivariate extreme model by Mohd Amin, Nor Azrita, Adam, Mohd Bakri

    Published 2016
    “…The bivariate extreme distribution based on logistic dependence function is used to model the extreme observations of two different variables. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems by Nor Sakinah, Abdul Shukor

    Published 2019
    “…The performance comparison was made only between the SED based method and G-NL-SPSA based method. In addition, the average percentage of the control objective improvement retrieved from the 30 trials for each method was also observed.…”
    Get full text
    Get full text
    Thesis
  8. 8

    Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems by Nor Sakinah, Abdul Shukor

    Published 2019
    “…The performance comparison was made only between the SED based method and G-NL-SPSA based method. In addition, the average percentage of the control objective improvement retrieved from the 30 trials for each method was also observed.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Application of Optimization Methods for Solving Clustering and Classification Problems by Shabanzadeh, Parvaneh

    Published 2011
    “…The data vectors are assigned to the closest cluster and correspondingly to the set, which contains this cluster and an algorithm based on a derivative-free method is applied to the solution of this problem. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Metaheuristic optimization techniques for localization in outdoor wireless sensor networks: a comprehensive review by Gumaida, Bassam, Ibrahim, Adamu Abubakar

    Published 2025
    “…This paper serves as a comprehensive background on localization algorithms and methods used in wireless sensor networks, offering insights for researchers to develop efficient localization algorithms tailored to specific application requirements in diverse work environments.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    The application of queuing theory model using the DSW Algorithm and the L-R Method to optimize customer flow at Pizza Hut / Anis Natasha Mohamad Nizam, Nurfatihah Nadirah Noor Azla... by Mohamad Nizam, Anis Natasha, Noor Azlan, Nurfatihah Nadirah, Fazli, Nur Izzati Aliah

    Published 2022
    “…This study aims to compare the behaviors of a queuing system at an order counter using the Fuzzy Queuing Model, which are the Dong, Shah, and Wong (DSW) Algorithm and the Left-Right (L-R) Method. …”
    Get full text
    Get full text
    Student Project
  12. 12

    Establishment of spectral subtraction-based algorithm for experimental modal analysis under operating condition by Che Ku Eddy Nizwan, Che Ku Husin

    Published 2022
    “…The direction of ambient response at each frequency band was estimated based on the reconstructed artificial ambient. The artificial ambient was reproduced based on pre-triggered data in measured vibration response. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    On some methods of feature engineering useful for craniodental morphometrics of rats, shrews and kangaroos / Aneesha Pillay Balachandran Pillay by Aneesha Pillay , Balachandran Pillay

    Published 2024
    “…This study proposes using recursive feature elimination (RFE) method to reduce data dimensionality and select the most important attributes based on predictor importance ranking. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Safe experimentation dynamics algorithm for identification of cupping suction based on the nonlinear Hammerstein model by Kavindran, Suresh, Mohd Riduwan, Ghazali, Mohd Ashraf, Ahmad

    Published 2023
    “…This research paper suggests a method to detect the cupping suction model by employing the Hammerstein model and utilizing the Safe Experimentation Dynamics (SED) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Robust Kernel Density Function Estimation by Dadkhah, Kourosh

    Published 2010
    “…The basic idea of RKWF based method is to first define a function which measures the outlying distance of observation. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Optimization and control of hydro generation scheduling using hybrid firefly algorithm and particle swarm optimization techniques by Hammid, Ali Thaeer

    Published 2018
    “…To deal with these problems, this thesis introduces three approved intelligent controllers for hydropower generation. Firstly, a hybrid algorithm namely firefly particle swarm optimization (FPSO) and series division method (SDM) based on the practical swarm optimization and the firefly algorithm is proposed. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Penalized LAD-SCAD estimator based on robust wrapped correlation screening method for high dimensional models by Baba, Ishaq Abdullahi, Midi, Habshah, Leong, Wah June, Ibragimov, Gafurjan I.

    Published 2021
    “…The SIS method uses the rank correlation screening (RCS) algorithm in the pre-screening step and the traditional Pathwise coordinate descent algorithm for computing the sequence of the regularization parameters in the post screening step for onward model selection. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    An efficient anomaly intrusion detection method with feature selection and evolutionary neural network by Sarvari, Samira, Mohd Sani, Nor Fazlida, Mohd Hanapi, Zurina, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…Moreover, the value of the solution is evaluated based on the objective function and the Fuzzy C Means (FCM) clustering method used to provide the best results for the overlapping dataset and create the fuzzy membership search domain which includes all possible compromise solutions. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Improved genetic algorithm for direct current motor high speed controller implemented on field programmable gate array by Alkhafaji, Falih Salih

    Published 2019
    “…The third methodology is to integrate the proposed controller on FPGA, using a new method to run the design based simulink model. …”
    Get full text
    Get full text
    Thesis