Search Results - (( based constructive method algorithm ) OR ( parameter validation using algorithm ))

Refine Results
  1. 1

    PSO and Linear LS for parameter estimation of NARMAX/NARMA/NARX models for non-linear data / Siti Muniroh Abdullah by Abdullah, Siti Muniroh

    Published 2017
    “…Typically, parameter estimation is performed using various types of Least Squares (LS) algorithms due to its stable and efficient numerical computation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Confidence intervals (CI) for concentration parameter in von Mises distribution and analysis of missing values for circular data / Siti Fatimah binti Hassan by Hassan, Siti Fatimah

    Published 2015
    “…The second part of the study is on the confidence intervals (CI) for the concentration parameter in von Mises distribution. Several methods in constructing the CI for the concentration parameter are proposed including CI based on circular population, CI based on the asymptotic distribution of ˆ , CI based on the distribution of 휃 and 푅 and also CI based on bootstrap-t method. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Using algorithmic taxonomy to evaluate lecturer workload by Hashim, Ruhil Hayati, Abdul Hamid, Jamaliah, Selamat, Mohd Hasan, Ibrahim, Hamidah, Abdullah, Rusli, Mohayidin, Mohd Ghazali

    Published 2006
    “…The Lecturer profile contains information of lecturer teaching load, research, publication and many more. We constructed an algorithmic taxonomy based on the lecturer profile data to measure lecturer teaching workload. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    A combinatory algorithm of univariate and multivariate gene selection by Mahmoodian, Sayed Hamid, Marhaban, Mohammad Hamiruce, Abdul Rahim, Raha, Rosli, Rozita, Saripan, M. Iqbal

    Published 2009
    “…In this paper, we considered new parameters which come up from singular value decomposition and present a combination algorithm for gene selection to integrate the univariate and multivariate approaches and compare it with gene selection based on correlation coefficient with binary output classes to analyze the effect of new parameters. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal by Abdul Hamid, Jamaliah, Mohayidin, Mohd Ghazali, Selamat, Mohd Hasan, Ibrahim, Hamidah, Abdullah, Rusli, Hashim, Ruhil Hayati

    Published 2006
    “…The Lecturer profile contains information lecturer teaching, research, publication and many more. We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal by Abdul Hamid, Jamaliah, Mohayidin, Mohd Ghazali, Selamat, Mohd Hassan, Ibrahim, Hamidah, Abdullah, Rusli, Hashim, Ruhil Hayati

    Published 2006
    “…Lecturer workload at universities includes three major categories: teaching, research and services.Teaching workload is influence by various factors such as level taught courses, number of student, credit and contact hour and off campus or on campus course design.The UPM has a KM Portal that contains sets of metadata on lecturer profile and knowledge assets.The Lecturer profile contains information lecturer teaching, research, publication and many more.We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload.This method measures the lecturer teaching workload.The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset.Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Application of system identification method coupled with evolutionary algorithms for the optimization of power consumption in a pem fuel cell propulsion system / Suhadiyana Hanapi by Hanapi, Suhadiyana

    Published 2018
    “…Secondly, in this research, an empirical dynamic model of the PEM fuel cell system in vehicles was analyzed and validated using the system identification method……”
    Get full text
    Get full text
    Book Section
  8. 8

    Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks / Wang Jie ... [et al.] by Wang, Jie, Mohd. Shah, Mohd. Kamal, Choong, Wai Heng, Al-Azad, Nahiyan

    Published 2024
    “…To enhance the accuracy of predicting pipeline defect sizes, this study introduces a magnetic leakage detection system, employing Backpropagation (BP) neural networks optimized with genetic algorithms. Traditional BP networks face challenges, including parameter determination and slow convergence, addressed through genetic algorithms' global search capabilities. …”
    Get full text
    Get full text
    Article
  9. 9

    Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks by Wang Jie, Mohd. Kamal Mohd. Shah, Choong Wai Heng, Nahiyan Al-Azad

    Published 2024
    “…To enhance the accuracy of predicting pipeline defect sizes, this study introduces a magnetic leakage detection system, employing Backpropagation (BP) neural networks optimized with genetic algorithms. Traditional BP networks face challenges, including parameter determination and slow convergence, addressed through genetic algorithms' global search capabilities. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Accurate localization method combining optimized hybrid neural networks for geomagnetic localization with multi-feature dead reckoning by Yan, Suqing, Luo, Baihui, Sun, Xiyan, Xiao, Jianming, Ji, Yuanfa, Kamarul Hawari, Ghazali

    Published 2025
    “…However, the existing geomagnetic localization methods suffer from location ambiguity. To address these issues, we propose a fusion localization algorithm based on particle swarm optimization. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Variable Neighborhood Descent and Whale Optimization Algorithm for Examination Timetabling Problems at Universiti Malaysia Sarawak by Emily Sing Kiang, Siew

    Published 2025
    “…A constructive algorithm was developed to generate an initial feasible solution, which was subsequently refined using two primary approaches to evaluate their efficiency: Iterative Threshold Pipe Variable Neighborhood Descent (IT-PVND), and a modified Whale Optimization Algorithm (WOA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Time series modeling of water level at Sulaiman Station, Klang River, Malaysia by Galavi, Hadi

    Published 2010
    “…Using the cross validation method the best training subset is selected to train the ANFIS model based on that dataset. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A NEW APPROACH IN EMPIRICAL MODELLING OF CO2 CORROSION WITH THE PRESENCE OF HAc AND H2S by PANCA ASMARA, YULI PANCA ASMARA

    Published 2011
    “…The corrosion experiments are based on both linear polarization resistance (LPR) and electrochemical impedance spectroscopy (EIS) methods. …”
    Get full text
    Get full text
    Thesis
  14. 14

    SWAT and ANN model hydrological assessment using Malaysia soil data / Khairi Khalid by Khalid, Khairi

    Published 2017
    “…The research also provides a streamflow prediction using the Artificial Neural Network (ANN) method as another tool for assessment. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks by Adday, Ghaihab Hassan, Subramaniam, Shamala K., Zukarnain, Zuriati Ahmad, Samian, Normalia

    Published 2023
    “…FD-TMS was comprehensively assessed in a simulation environment utilizing a performance analysis tool constructed on Java. The results were compared to the baseline algorithm, highlighting key parameters like false alarms and event detection accuracy. …”
    Get full text
    Get full text
    Article
  16. 16

    Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure by Asbullah, Muhammad Asyraf

    Published 2015
    “…Moreover, for the purpose of empirical evidences, some parameters are chosen in the course of the process to validate the efficiency in terms of algorithmic running time and memory consumptions. …”
    Get full text
    Get full text
    Thesis
  17. 17

    EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique by Liew, Siaw Hong

    Published 2016
    “…The IncFRNN algorithm updates the training set by employing a heuristic update method to maintain representative objects and eliminate rarely used objects. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Wastewater treatment process: a modified model for oxidation pond by Syafiqah Hanis, Mohd Fauzi

    Published 2021
    “…The model has been solved numerically by using the 4th order Runge-Kutta method and a parameter fitting technique namely Nelder-Mead simplex algorithm embedded in MATLAB software. …”
    Get full text
    Get full text
    Thesis
  19. 19

    On heat transfer in Carreau fluid flow with thermal slip : An artificial intelligence (AI) based decisions integrated with lie symmetry by Rehman, Khalil Ur, Shatanawi, Wasfi, Abdul Rahman, Mohd Kasim

    Published 2024
    “…The flow differential equations are reduced by using Lie symmetry analysis. The reduced equations are solved by using the shooting method. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Artificial neural networks for burst pressure strength of corroded subsea pipelines repaired with composite fiber-reinforced polymer patches / Mohd Fakri Muda by Muda, Mohd Fakri

    Published 2023
    “…A computational model for predicting the burst pressure strength of repaired pipelines with composite FRP patches was employed using the ANN algorithm. The geometry of corrosion damage was defined by three physical parameters, namely length, width, and depth. …”
    Get full text
    Get full text
    Thesis