Search Results - (( variable identification based algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- variable identification »
- identification based »
- application testing »
- testing algorithm »
- java application »
-
1
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…System identification is a method of determining a mathematical relation between variables and terms of a process based on observed input-output data. …”
Get full text
Get full text
Get full text
Article -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
Smoothed functional algorithm with norm-limited update vector for identification of continuous-time fractional-order Hammerstein Models
Published 2024“…In particular, the standard smoothed functional algorithm (SFA) based method is modified by implementing a limit function in the update vector of the standard SFA based method to solve the issue of high tendency of divergence during the identification process. …”
Get full text
Get full text
Get full text
Article -
4
Identification of continuous-time hammerstein model using improved archimedes optimization algorithm
Published 2024“…This proposed algorithm also discerned linear and nonlinear subsystem variables within a continuous-time Hammerstein model utilizing input and output data. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
6
The Identification of High Potential Archers Based on Fitness and Motor Ability Variables: A Support Vector Machine Approach
Published 2018“…Hierarchical agglomerative cluster analysis (HACA) was used to cluster the archers based on the performance variables tested. SVM models with linear, quadratic, cubic, fine RBF, medium RBF, as well as the coarse RBF kernel functions, were trained based on the measured performance variables. …”
Get full text
Get full text
Get full text
Article -
7
Gas Identi cation by Using a Cluster-k-Nearest-Neighbor
Published 2009“…In this paper, a novel gas identification approach based on Cluster-k-Nearest Neighbor. …”
Get full text
Get full text
Article -
8
-
9
Ensemble-based machine learning algorithms for classifying breast tissue based on electrical impedance spectroscopy
Published 2020“…In addition, the ranked order of the variables based on their importance differed across the ML algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
-
11
Modelling of cupping suction system based on system identification method
Published 2022Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
The identification of high potential archers based on relative psychological coping skills variables: A Support Vector Machine approach
Published 2018“…Psychological coping skills inventory which evaluates the archers level of related coping skills were filled out by the archers prior to their shooting tests. k-means cluster analysis was applied to cluster the archers based on their scores on variables assessed. SVM models, i.e. linear and fine radial basis function (RBF) kernel functions, were trained on the psychological variables. …”
Get full text
Get full text
Conference or Workshop Item -
13
-
14
-
15
Development of an effective clustering algorithm for older fallers
Published 2022“…The purpose of this study was, therefore, to develop a clustering-based algorithm to determine falls risk. Data from the Malaysian Elders Longitudinal Research (MELoR), comprising 1411 subjects aged ≥55 years, were utilized. …”
Get full text
Get full text
Article -
16
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
17
Nonlinear identification for dengue fever / Herlina Abdul Rahim.
Published 2009“…This thesis presents the development of a non-invasive system identification for the monitoring of the progression of dengue infection based on hemoglobin concentration. …”
Get full text
Get full text
Thesis -
18
Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model
Published 2001“…In this paper, major properties of an adaptive fuzzy model as a system identifier when trained by the back-propagation algorithm are discussed. The standard rule-based fuzzy models were used to identify discrete-time nonlinear dynamic systems. …”
Get full text
Get full text
Get full text
Article -
19
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
20
Potential norms detection in social agent societies
Published 2023“…Based on these variables, the PNMA is used to revise the norms and identify the new normative protocol to comply with the domain's norms. …”
Article
