Search Results - (( based constructive method algorithm ) OR ( _ normalization based algorithm ))
Search alternatives:
- normalization based »
- based constructive »
- method algorithm »
- _ normalization »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…In order to make the normal people can cluster their data easily, this project aims is to develop a web-based clustering tool that can be used by all peoples. …”
Get full text
Get full text
Thesis -
2
Confidence intervals (CI) for concentration parameter in von Mises distribution and analysis of missing values for circular data / Siti Fatimah binti Hassan
Published 2015“…The second part of the study is on the confidence intervals (CI) for the concentration parameter in von Mises distribution. Several methods in constructing the CI for the concentration parameter are proposed including CI based on circular population, CI based on the asymptotic distribution of ˆ , CI based on the distribution of 휃 and 푅 and also CI based on bootstrap-t method. …”
Get full text
Get full text
Thesis -
3
Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring
Published 2021“…The prototype of SEM is constructed based on the modern Smart Meter design and modified with additional control devices and sensors, so that it can measure, record and transfer the data using designated algorithm combining three types of communication system in one device; Wi-Fi, GSM and RF. …”
Get full text
Get full text
Thesis -
4
PSO and Linear LS for parameter estimation of NARMAX/NARMA/NARX models for non-linear data / Siti Muniroh Abdullah
Published 2017“…The proposed method is compared with three established conventional Linear Least Squares (LLS) solution methods : Normal Equation (NE), QR factorization (QR) and Singular Value Decomposition (SVD). …”
Get full text
Get full text
Thesis -
5
AUTONOMOUS POWER LINE INSPECTION USING COMPUTER VISION
Published 2022“…The developed algorithm is trained on the augmented Chinese Power Line Insulator Dataset (CPLID) that consisted of normal and missing cap insulator images. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
6
Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation
Published 2024“…In response to the current issues of poor real-time performance, high computational costs, and excessive memory usage of object detection algorithms based on deep convolutional neural networks in embedded devices, a method for improving deep convolutional neural networks based on model compression and knowledge distillation is proposed. …”
Get full text
Get full text
Article -
7
Fault Detection and Identification in Quadrotor System (Quadrotor Robot)
Published 2016“…The aim of the research is to construct and design a Fault Detection and Isolation algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Reliability assessment of power system generation adequacy with wind power using population-based intelligent search methods
Published 2017“…The reliability assessment of the adequacy of the generating system is normally calculated by using either analytical or simulation methods. …”
Get full text
Get full text
Get full text
Thesis -
9
Innovation of marketing supply chain management model based on SICAS modeling
Published 2024“…A collaborative optimization model of the supply chain based on virtual inventory management is constructed to ensure the normal operation of the whole supply chain by deploying flexible inventory in the hands of customers, and the constructed model is solved by using an evolutionary algorithm based on indexes and an optimal solution sorting method based on regret theory. …”
Get full text
Get full text
Article -
10
Recursive construction of output-context fuzzy systems for the condition monitoring of electrical hotspots based on infrared thermography
Published 2015“…The proposed RCFS realizes the prominent distinctions in the output domain by using a self-organizing method. The termination of the recursive algorithm finds an effective rule base to achieve an accurate representation of the datasets. …”
Get full text
Get full text
Get full text
Article -
11
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…In recent years, data mining based anomaly detection (DMAD), particularly classification methods, have been incessantly enhanced in differentiating normal and attack behaviour. …”
Get full text
Get full text
Thesis -
12
Scheduling dynamic cellular manufacturing systems in the presence of cost uncertainty using heuristic method
Published 2016“…Since the proposed models (like similar models in the literature) are likely to fall into local optimum points, a Branch and Bound based heuristic, a hybrid Simulated Annealing and Genetic algorithm, a hybrid Tabu search and Simulated Annealing, a hybrid Genetic algorithm and Simulated Annealing, a hybrid Ant Colony Optimization and Simulated Annealing and a hybrid Multi-layer Perceptron and Simulated Annealing algorithms are developed. …”
Get full text
Get full text
Thesis -
13
Machine condition monitoring and fault diagnosis using spectral analysis techniques
Published 2001“…Results of analysis clearly indicate that this method of analysis can be further developed and used for self-diagnosis, predictive maintenance and intelligent-based monitoring.…”
Get full text
Get full text
Proceeding Paper -
14
Mean of correlation method for optimization of affective states detection in children
Published 2018“…This paper proposes an effective algorithm of texture analysis based on novel technique using Gray Level Co-occurrence Matrix approach to be applied so as to identify blood-flow region. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Machine Learning based Predictive Modelling of Cybersecurity Threats Utilising Behavioural Data
Published 2023“…The algorithms are used to construct, test, and validate three categories of cybercrime threat (Malware, Social Engineering, and Password Attack) predictive models. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Verification of volume-of-fluid (VOF) simulation for thin liquid film applications
Published 2023“…Comparisons of the VOF-calculated surface profiles with the ones obtained using the explicit surface tracking algorithms such as the Boundary Element Method (BEM) reported in the literature showed that the VOF model is able to produce the expected profiles of thin liquid film flowing a two-dimensional rectangular cavity and thus can be considered for simulation of other applications involving thin liquid film flows, provided the grid refinement based on the volume fraction gradient is applied. �2009 IEEE.…”
Conference paper -
17
Delamination in fiberglass pre-impregnated laminated composites from ultrasonic a-scan signal using artificial intelligence
Published 2018“…This technique is not suitable as the damage caused by the impact normally occurred by accident at random location. …”
Get full text
Get full text
Thesis -
18
Fuzzy-pid controller design for brake-by-wire system of electrical vehicle
Published 2014“…In view of that, the mechanism behavior and operating process of both brake systems are dominated by implementing distinct control algorithms based on PID and Fuzzy-PID controllers. …”
Get full text
Get full text
Thesis -
19
Reservoir Inflow Forecasting Using Artificial Neural Network and Adaptive Neuro-Fuzzy Inference System Techniques
Published 2007“…The model was trained based on the Leven-berg Marquardt algorithm with sigmoid activation functions. …”
Get full text
Get full text
Thesis -
20
An evolutionary based features construction methods for data summarization approach
Published 2015“…In this work, we empirically compare the predictive accuracies of classification tasks based on the proposed feature construction methods and also the existing feature construction methods. …”
Get full text
Get full text
Research Report
