Search Results - (( basic identification method algorithm ) OR ( code classification tree algorithm ))
Search alternatives:
- identification method »
- basic identification »
- code classification »
- classification tree »
- method algorithm »
- tree algorithm »
-
1
Recursive Subspace Identification Algorithm Using The Propagator Based Method
Published 2017“…In this paper, the recursive subspace identification algorithm based on the propagator method which avoids the SVD computation is proposed. …”
Get full text
Get full text
Get full text
Article -
2
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
3
Machine learning-based enhanced deep packet inspection for IP packet priority classification with differentiated services code point for advance network management
Published 2024“…This study presents an approach to enhance intelligent packet forwarding priority classification on Differentiated Services Code Point (DSCP), leveraging classifiers from machine learning algorithms for Deep Packet Inspection (DPI). …”
Get full text
Get full text
Get full text
Get full text
Article -
4
-
5
Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus
Published 2003“…Voltage stability margin (VSM) can be basically identified by the multi-solution load flow calculation method. …”
Get full text
Get full text
Thesis -
6
System identification using Extended Kalman Filter
Published 2017“…System identification is getting more intensive from researcher to develop an algorithm with work efficiently and more accurate. …”
Get full text
Get full text
Student Project -
7
Comparative analysis for topic classification in juz Al-Baqarah
Published 2018“…The SVM performance is then compared against other classification algorithms such as Naive Bayes, J48 Decision Tree and K-Nearest Neighbours. …”
Get full text
Get full text
Article -
8
Automatic detection and indication of pallet-level tagging from rfid readings using machine learning algorithms
Published 2020“…The ensemble learning technique, changes of activation function in Neural Network as well as the unsupervised learning (k-means clustering algorithm and Friis Transmission Equation) was also applied to classify the multiclass classification in pallet-level. …”
Get full text
Get full text
Thesis -
9
-
10
Identification model for hearing loss symptoms using machine learning techniques
Published 2014“…The model is implemented using both unsupervised and supervised machine learning techniques in the form of Frequent Pattern Growth (FP-Growth) algorithm as feature transformation method and multivariate Bernoulli naïve Bayes classification model as the classifier. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
-
12
Wearable based-sensor fall detection system using machine learning algorithm
Published 2021“…As for future work, the plan is to convert the code to an app to run on the smartphone so it can be commercialized.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Simultaneous Computation of Model Order and Parameter Estimation of a Heating System Based on Gravitational Search Algorithm for Autoregressive with Exogenous Inputs
Published 2015“…Model order selection and parameter estimation are two significant aspects of determining the mathematical model for system identification. In this paper, an approach termed as Simultaneous Model Order and Parameter Estimation (SMOPE), which is basically based on Gravitational Search Algorithm (GSA), is proposed to combine these two parts into a simultaneous solution. …”
Get full text
Get full text
Get full text
Article -
14
Designing an integrated AIOT system for tracking class attendance
Published 2024“…The system is able to capture the students' real facial feature data, and uses it as a tool to achieve high-accuracy student identification. Basics and ensures that the software is more secure than the previous traditional attendance method using roll-less slides. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Review of Wheat Disease Classification and Severity Detection Models
Published 2023“…This paper mainly aims to explain deep learning-based wheat diseases identification algorithm, and to discuss the benefits and drawbacks of present wheat disease detection approaches. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
-
17
Disposable Biomimetic Array Sensor Strip Coupled With Chemometric Algorithm For Quality Assessment Of Orthosiphon Stamineus Benth Samples
Published 2006“…The classification model built with PCA was useful for the discrimination of the herb according to its parts; stem and leaves, while was also successfully applicable for different type of O.stamineus extracts identification. PCA has also been applied for batch to batch consistency screening of the herb while model built with DA on the other hand was able to predict the taste of O.stamineus sample which was found to be bitter taste based on the five basic taste qualities. …”
Get full text
Get full text
Thesis -
18
Parametric modelling of a TRMS using dynamic spread factor particle swarm optimisation
Published 2009“…The proposed method formulates a modified inertia weight algorithm by using a dynamic spread factor (SF). …”
Get full text
Get full text
Get full text
Proceeding Paper -
19
Review of deep convolution neural network in image classification
Published 2017“…With the development of large data age, Convolutional neural networks (CNNs) with more hidden layers have more complex network structure and more powerful feature learning and feature expression abilities than traditional machine learning methods. The convolution neural network model trained by the deep learning algorithm has made remarkable achievements in many large-scale identification tasks in the field of computer vision since its introduction. …”
Get full text
Get full text
Get full text
Article -
20
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…The traditional ways that used to protect privacy such as Personal Identification Number (PIN) and smart card are getting replaced by the biometric methods due to its high risk for being forgotten and exposure. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
