Search Results - (( using optimization method algorithm ) OR ( software identification system algorithm ))

Refine Results
  1. 1

    Three phase fault algorithm in distribution system by using database approach and impedance based method by Shamsudin, N.H., Latiff, A.A., Abas, N., Mokhlis, Hazlie, Awalin, L.J.

    Published 2012
    “…A three phase fault location algorithm using database and impedance based method is utilized in distribution system to locate fault which may occur in any possible fault sections and to optimize the switching operations to reduce the outage time affected by fault. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Improved intrusion detection algorithm based on TLBO and GA algorithms by Aljanabi, Mohammad, Mohd Arfian, Ismail

    Published 2021
    “…Optimization algorithms are widely used for the identification of intrusion. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Fuzzy modelling using firefly algorithm for phishing detection by Noor Syahirah, Nordin, Mohd Arfian, Ismail, Mezhuyev, Vitaliy, Shahreen, Kasim, Mohd Saberi, Mohamad, Ashraf Osman, Ibrahim

    Published 2019
    “…To generate the fuzzy parameters automatically, an optimization method is needed. One of the suitable methods provides the Firefly Algorithm (FA). …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Designing an integrated AIOT system for tracking class attendance by Kuak, Xuan Ren

    Published 2024
    “…For face detection the system uses a YOLO (You Only Look Once) algorithm, which allows quick and efficient recognition of student faces in the classroom context. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    A modified technique in RFID networking planning and optimization by Nawawi, Azli

    Published 2015
    “…In this research, PSO algorithm was used in the optimization process as it was considered as a very useful, efficient and well known algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    A COLLABORATIVE FRAMEWORK FOR ANDROID MALWARE IDENTIFICATION USING DYNAMIC ANALYSIS by Thayaaleni, Rajandran

    Published 2019
    “…The proposed project achieves overall accuracy level of 96.67% using Sequential Minimal Optimization classifier.…”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  7. 7

    Direct Adaptive Predictive Control For Wastewater Treatment Plant by Shair, Ezreen Farina, Abu Bakar, Norazhar, Mohd Nor, Arfah Syahida, Mohd Azam, Sazuan Nazrah, Mohd Sobran, Nur Maisarah, Zainal Abidin, Amar Faiz

    Published 2012
    “…The adaptive control structure is based on the linear model of the process and combined with numerical algorithm for subspace state space system identification (N4SID). …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Online system identification development based on recursive weighted least square neural networks of nonlinear hammerstein and wiener models. by Kwad, Ayad Mahmood

    Published 2022
    “…This research introduces a developed method for online system identification based on the Hammerstein and Wiener nonlinear block-oriented structure with the artificial neural networks (NN) advantages and recursive weighted least squares algorithm for optimizing neural network learning in real-time. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali by Mohd Razali, Ainaa Farhanah

    Published 2022
    “…The system algorithm is verified and validates on two sloped bumps surface topographies that have been simulated using MATLAB software and measured using the Alicona Infinite Focus Measurement (IFM) device, respectively. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Online fingerprint recognition by Khairul Bariyah, Abd Rahim

    Published 2010
    “…All the systems will be built using MATLAB software…”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12

    Discrete-Time System Identification Based On Novel Information Criterion Using Genetic Algorithm by Abd Samad, Md Fahmi, Mohd Nasir, Abdul Rahman

    Published 2017
    “…Model structure selection is a problem in system identification which addresses selecting an adequate model i.e. a model that has a good balance between parsimony and accuracy in approximating a dynamic system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Comparison Of Crossover In Genetic Algorithm For Discrete-Time System Identification by Zainuddin, Farah Ayiesya, Abd Samad, Md Fahmi

    Published 2021
    “…System identification is a process where a mathematical model is derived in order to explain dynamical behaviour of a system. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Register Transfer Level Implementation Of Pooling - Based Feature Extraction For Finger Vein Identification by Mohamed Ali, Mohamed Hassan

    Published 2017
    “…With those improvements in accuracy and the speed, the proposed algorithm contributes to the advancement of finger vein biometric system.…”
    Get full text
    Get full text
    Thesis
  15. 15

    Modelling of the anti-collision algorithm in RFID system: article / Shafinaz Ismail by Ismail, Shafinaz

    Published 2014
    “…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
    Get full text
    Get full text
    Article
  16. 16

    Modelling of the anti-collision algorithm in RFID system / Shafinaz Ismail by Ismail, Shafinaz

    Published 2014
    “…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    Software-Defined Radio-Based Modulation and Demodulation Scheme by Bakhraiba, Ahmed Mohamed Salih

    Published 2009
    “…However, the identification ability of the system may vary from one modulation scheme to another, and from CWT to FFT; therefore, designing an identification system which combines both the techniques will be able to increase the ability for accurate identification.…”
    Get full text
    Get full text
    Thesis
  20. 20

    Application of genetic algorithm methods to optimize flowshop sequencing problem by Mohd Fadil, Md Sairi

    Published 2008
    “…Genetic algorithm method was one of the methods that were widely used in solving optimization problem. …”
    Get full text
    Get full text
    Undergraduates Project Papers