Search Results - (( based constructive method algorithm ) OR ( _ normalization based algorithm ))

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…In order to make the normal people can cluster their data easily, this project aims is to develop a web-based clustering tool that can be used by all peoples. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Confidence intervals (CI) for concentration parameter in von Mises distribution and analysis of missing values for circular data / Siti Fatimah binti Hassan by Hassan, Siti Fatimah

    Published 2015
    “…The second part of the study is on the confidence intervals (CI) for the concentration parameter in von Mises distribution. Several methods in constructing the CI for the concentration parameter are proposed including CI based on circular population, CI based on the asymptotic distribution of ˆ , CI based on the distribution of 휃 and 푅 and also CI based on bootstrap-t method. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring by Ab Halim, Haizum Hanim

    Published 2021
    “…The prototype of SEM is constructed based on the modern Smart Meter design and modified with additional control devices and sensors, so that it can measure, record and transfer the data using designated algorithm combining three types of communication system in one device; Wi-Fi, GSM and RF. …”
    Get full text
    Get full text
    Thesis
  4. 4

    PSO and Linear LS for parameter estimation of NARMAX/NARMA/NARX models for non-linear data / Siti Muniroh Abdullah by Abdullah, Siti Muniroh

    Published 2017
    “…The proposed method is compared with three established conventional Linear Least Squares (LLS) solution methods : Normal Equation (NE), QR factorization (QR) and Singular Value Decomposition (SVD). …”
    Get full text
    Get full text
    Thesis
  5. 5

    AUTONOMOUS POWER LINE INSPECTION USING COMPUTER VISION by LAW, JIN MING

    Published 2022
    “…The developed algorithm is trained on the augmented Chinese Power Line Insulator Dataset (CPLID) that consisted of normal and missing cap insulator images. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  6. 6

    Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation by Chen, Qipeng, Xiong, Qiaoqiao, Huang, Haisong, Tang, Saihong, Liu, Zhenghong

    Published 2024
    “…In response to the current issues of poor real-time performance, high computational costs, and excessive memory usage of object detection algorithms based on deep convolutional neural networks in embedded devices, a method for improving deep convolutional neural networks based on model compression and knowledge distillation is proposed. …”
    Get full text
    Get full text
    Article
  7. 7

    Fault Detection and Identification in Quadrotor System (Quadrotor Robot) by Chan, Shi Jing, Pebrianti, Dwi

    Published 2016
    “…The aim of the research is to construct and design a Fault Detection and Isolation algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Reliability assessment of power system generation adequacy with wind power using population-based intelligent search methods by Kadhem, Athraa Ali

    Published 2017
    “…The reliability assessment of the adequacy of the generating system is normally calculated by using either analytical or simulation methods. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Innovation of marketing supply chain management model based on SICAS modeling by Mao, Rui, Liu, Youwei, Yang, Yida

    Published 2024
    “…A collaborative optimization model of the supply chain based on virtual inventory management is constructed to ensure the normal operation of the whole supply chain by deploying flexible inventory in the hands of customers, and the constructed model is solved by using an evolutionary algorithm based on indexes and an optimal solution sorting method based on regret theory. …”
    Get full text
    Get full text
    Article
  10. 10

    Recursive construction of output-context fuzzy systems for the condition monitoring of electrical hotspots based on infrared thermography by Ahmed, M.M., Huda, A.S.N., Isa, N.A.M.

    Published 2015
    “…The proposed RCFS realizes the prominent distinctions in the output domain by using a self-organizing method. The termination of the recursive algorithm finds an effective rule base to achieve an accurate representation of the datasets. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…In recent years, data mining based anomaly detection (DMAD), particularly classification methods, have been incessantly enhanced in differentiating normal and attack behaviour. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Scheduling dynamic cellular manufacturing systems in the presence of cost uncertainty using heuristic method by Delgoshaei, Aidin

    Published 2016
    “…Since the proposed models (like similar models in the literature) are likely to fall into local optimum points, a Branch and Bound based heuristic, a hybrid Simulated Annealing and Genetic algorithm, a hybrid Tabu search and Simulated Annealing, a hybrid Genetic algorithm and Simulated Annealing, a hybrid Ant Colony Optimization and Simulated Annealing and a hybrid Multi-layer Perceptron and Simulated Annealing algorithms are developed. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Machine condition monitoring and fault diagnosis using spectral analysis techniques by Salami, Momoh Jimoh Eyiomika, Abdul Muthalif, Asan Gani, Pervez, T.

    Published 2001
    “…Results of analysis clearly indicate that this method of analysis can be further developed and used for self-diagnosis, predictive maintenance and intelligent-based monitoring.…”
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Mean of correlation method for optimization of affective states detection in children by Rusli, Nazreen, Sidek, Shahrul Na'im, Md Yusuf, Hazlina, Ishak, Nor Izzati

    Published 2018
    “…This paper proposes an effective algorithm of texture analysis based on novel technique using Gray Level Co-occurrence Matrix approach to be applied so as to identify blood-flow region. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Machine Learning based Predictive Modelling of Cybersecurity Threats Utilising Behavioural Data by Ting, Tin Tin, Khiew, Jie Xin, Ali Aitizaz, Lee, Kuok Tiung, Teoh, Chong Keat, Hasan Sarwar

    Published 2023
    “…The algorithms are used to construct, test, and validate three categories of cybercrime threat (Malware, Social Engineering, and Password Attack) predictive models. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Verification of volume-of-fluid (VOF) simulation for thin liquid film applications by Balachandran S., Shuaib N.H., Hasini H., Yusoff M.Z.

    Published 2023
    “…Comparisons of the VOF-calculated surface profiles with the ones obtained using the explicit surface tracking algorithms such as the Boundary Element Method (BEM) reported in the literature showed that the VOF model is able to produce the expected profiles of thin liquid film flowing a two-dimensional rectangular cavity and thus can be considered for simulation of other applications involving thin liquid film flows, provided the grid refinement based on the volume fraction gradient is applied. �2009 IEEE.…”
    Conference paper
  17. 17

    Delamination in fiberglass pre-impregnated laminated composites from ultrasonic a-scan signal using artificial intelligence by Mahmod, Muhammad Faisal

    Published 2018
    “…This technique is not suitable as the damage caused by the impact normally occurred by accident at random location. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Fuzzy-pid controller design for brake-by-wire system of electrical vehicle by Sider, Ameer M. F.

    Published 2014
    “…In view of that, the mechanism behavior and operating process of both brake systems are dominated by implementing distinct control algorithms based on PID and Fuzzy-PID controllers. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Reservoir Inflow Forecasting Using Artificial Neural Network and Adaptive Neuro-Fuzzy Inference System Techniques by Googhari, Shahram Karimi

    Published 2007
    “…The model was trained based on the Leven-berg Marquardt algorithm with sigmoid activation functions. …”
    Get full text
    Get full text
    Thesis
  20. 20

    An evolutionary based features construction methods for data summarization approach by Rayner Alfred, Suraya Alias, Chin, Kim On

    Published 2015
    “…In this work, we empirically compare the predictive accuracies of classification tasks based on the proposed feature construction methods and also the existing feature construction methods. …”
    Get full text
    Get full text
    Research Report