Search Results - (( based evaluation method algorithm ) OR ( variable detection using algorithm ))

Refine Results
  1. 1

    Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification by Abd Samad, Md Fahmi

    Published 2011
    “…Identification studies using NARX (Nonlinear AutoRegressive with eXogenous input) models employing simulated systems and real plant data are used to demonstrate that the algorithm is able to detect significant variables and terms faster and to select a simpler model structure than other well-known EC methods.…”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Shape-based Road Sign Detection and Recognition for Embedded Application Using MATLAB by Md Sallah, Siti Sarah, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2010
    “…In this paper, we propose a road sign detection and recognition algorithm for an embedded application. The algorithm is based on the Hough transform method to detect lines in order to identify and determine the shape of the road sign. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Extremal region detection and selection with fuzzy encoding for food recognition by Razali @ Ghazali, Mohd Norhisham

    Published 2019
    “…The proposed methods have been evaluated using two image datasets: UECFOOD-100 and UNICT-FD1200. …”
    Get full text
    Get full text
    Thesis
  4. 4

    MotionSure: a cloud-based algorithm for detection of injected object in data in motion by Islam, Thouhedul, Olanrewaju, Rashidah Funke, Khalifa, Othman Omran

    Published 2017
    “…Total 1600 different type of files were used for evaluation of the proposed algorithm, results show that 87% of injected objects were correctly detected…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    Damage visualization based on frequency shift of single-mode ultrasound-guided wavefield by Shahrim, Muhamad Azim, Harmin, Mohammad Yazdi, Romli, Fairuz Izzuddin, Chia, Chen Ciang, Jung-Ryul, Lee

    Published 2022
    “…Overall, the results show that frequency analysis can detect the damage four times faster and the algorithm uses two-dimensional calculation instead of conventional three-dimensional of VTWAM method.…”
    Get full text
    Get full text
    Article
  6. 6

    Characterization of digital intra-oral dental radiographs based on image enhancement algorithms (IEAs) / Siti Arpah Ahmad by Ahmad, Siti Arpah

    Published 2017
    “…In addition, dentists' subjective evaluation variability issues are investigated based on supervised, non-supervised method and questionnaire viewing approach; twin-view approach versus random approach. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Heartbeat Anomaly Detection Method Based on Electrocardiogram using Improved Certainty Cognitive Map by Sumiati, .

    Published 2023
    “…This research has 3 objectives To develop algorithms for detecting heart conditions as either abnormal or normal using the modified cognitive map (CM) approach, To develop detection algorithms for anomalous heart conditions based on the enhancement of Certainty Factor (CF) technique, and To evaluate and validate the effectiveness of the new proposed model specifically the Certainty Cognitive Map (CCM) for identifying heart defects. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Improvement on rooftop classification of worldview-3 imagery using object-based image analysis by Norman, Masayu

    Published 2019
    “…The accuracy of each algorithm was evaluated using LibSVM, Bayes network, and Adaboost classifier. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Development of sorting system for oil palm in vitro shoots using machine vision approach by Al-Ruhaimi, Hamdan Yahya Ahmed

    Published 2014
    “…By using k-means algorithm the extracted features have been evaluated. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Detection of leak size and its location in a water distribution system by using K-NN / Nasereddin Ibrahim Sherksi by Sherksi, Nasereddin Ibrahim

    Published 2020
    “…The successfully achieved four set objectives inclusive of (1) a new classification model to detect water leakage, (2) analysis of the effects of leakage size on the variables within a WDS, i.e. flow, pressure, pipe volume, velocity and water demand, (3) locating and specifying the leakage size in the WDS, and (4) evaluate the performance of the designed K-NN algorithm for accurate leak detection. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Vibration analysis for early detection of bearing failures by Gam, Kheng Shiang

    Published 2024
    “…The key findings of this study highlight several important observations in bearing fault detection. First, the use of the envelope spectrum has proven to be highly valuable in visualizing specific bearing fault frequencies, which makes it a powerful tool for fault detection. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Block multistep methods for solving first order retarded and neutral delay differential equations by Abdul Aziz, Nurul Huda

    Published 2015
    “…A new subroutine function has been added in the developed algorithm with the capabilities to approximate the neutral delay term using the interpolation of function evaluation. …”
    Get full text
    Get full text
    Thesis
  13. 13

    New global maximum power point tracking and modular voltage equalizer topology for partially shaded photovoltaic system / Immad Shams by Immad , Shams

    Published 2022
    “…Only one dynamic variable is used as a tuning parameter reducing the complexity of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Liver segmentation on CT images using random walkers and fuzzy c-means for treatment planning and monitoring of tumors in liver cancer patients by Moghbel, Mehrdad

    Published 2017
    “…Based on the location of the lung, the liver dome is automatically detected and the liver is then extracted by random walkers method and refined using a fuzzy level set method. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Power System State Estimation In Large-Scale Networks by NURSYARIZAL MOHD NOR, NURSYARIZAL

    Published 2010
    “…The gain and the Jacobian matrices associated with the basic algorithm require large storage and have to be evaluated at every iteration, resulting in more computation time. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A deep learning approach for facial detection in targeted billboard advertising / Lau Sian En by Lau , Sian En

    Published 2025
    “…This system utilises sophisticated deep learning algorithm using Convolutional Neural Network (CNN) to identify and examine human faces, enabling advertisers to customise their content according to demographic variables including age and gender. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Numerical Analysis of structural batteries response with the presence of uncertainty by Syahiir Kamil, Ahmad Kamal Ariffin, Abdul Hadi Azman, Mohamad Syazwan Zafwan Mohamad Suffian

    Published 2023
    “…To help with the analysis, a dedicated algorithm based on an elimination approach to solve numerical problems with uncertain parameters is successfully developed using Visual Basic. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    A peer-to-peer blockchain based interconnected power system by Ahmed, Musse Mohamud, Mohammad Kamrul, Hasan, Muhammad, Shafiq, Md Ohirul, Qays, Gadekallu, Thippa Reddy, Nebhen, Jamel, Shayla, Islam

    Published 2021
    “…Harmonics is a power efficiency/quality variable caused by electronic devices that domestic and industrial consumers use. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Numerical Analysis of Structural Batteries Response with the Presence of Uncertainty by Syahiir, Kamil, Mohamad Syazwan Zafwan, Mohamad Suffian, Ahmad Kamal Ariffin, Mohd Ihsan, Abdul Hadi, Azman

    Published 2023
    “…To help with the analysis, a dedicated algorithm based on an elimination approach to solve numerical problems with uncertain parameters is successfully developed using Visual Basic. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…Detection methods based on statistical and data mining techniques are widely deployed as anomaly-based detection system (ADS). …”
    Get full text
    Get full text
    Thesis