Search Results - (( data internalization based algorithm ) OR ( parameter evaluation method algorithm ))

Refine Results
  1. 1
  2. 2

    Evaluation of Lightning Current Using Inverse Procedure Algorithm. by Ab Kadir, Mohd Zainal Abidin, Izadi, Mahdi, Askari, Mohamad Tolou, Hajikhani, Maryam

    Published 2013
    “…The proposed method considers on all electromagnetic fields components and can evaluate full shape of current, velocity and constant parameters of current models in contrast with previous studies. …”
    Get full text
    Get full text
    Article
  3. 3

    Analysis of toothbrush rig parameter estimation using different model orders in Real-Coded Genetic Algorithm (RCGA) by Ainul, H. M. Y., Salleh, S. M., Halib, N., Taib, H., Fathi, M. S.

    Published 2018
    “…The influence of conventional genetic algorithm parameter - generation gap has been investigated too. …”
    Get full text
    Article
  4. 4

    Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal by Abdul Hamid, Jamaliah, Mohayidin, Mohd Ghazali, Selamat, Mohd Hasan, Ibrahim, Hamidah, Abdullah, Rusli, Hashim, Ruhil Hayati

    Published 2006
    “…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Analysis of Toothbrush Rig Parameter Estimation Using Different Model Orders in Real Coded Genetic Algorithm (RCGA) by Ainul, H. M. Y., Salleh, S. M., Halib, N., Taib, H., Fathi, M. S.

    Published 2024
    “…The influence of conventional genetic algorithm parameter - generation gap has been investigated too. …”
    Article
  6. 6

    Autism Spectrum Disorder Classification Using Deep Learning by Abdulrazak Yahya, Saleh, Lim Huey, Chern

    Published 2021
    “…Finally, the effectiveness of the algorithm is evaluated based on the accuracy performance. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal by Abdul Hamid, Jamaliah, Mohayidin, Mohd Ghazali, Selamat, Mohd Hassan, Ibrahim, Hamidah, Abdullah, Rusli, Hashim, Ruhil Hayati

    Published 2006
    “…Lecturer workload at universities includes three major categories: teaching, research and services.Teaching workload is influence by various factors such as level taught courses, number of student, credit and contact hour and off campus or on campus course design.The UPM has a KM Portal that contains sets of metadata on lecturer profile and knowledge assets.The Lecturer profile contains information lecturer teaching, research, publication and many more.We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload.This method measures the lecturer teaching workload.The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset.Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Liquid slosh suppression by implementing data-driven fractional order pid controller based on marine predators algorithm by Mohd Tumari, Mohd Zaidi Mohd, Mustapha, Nik Mohd Zaitul Akmal, Ahmad, Mohd Ashraf, Saat, Shahrizal, Ghazali, Mohd Riduwan

    Published 2023
    “…The effectiveness of the FOPID controller tuning method based on MPA was assessed by evaluating the performance criteria in terms of convergence curve of the average fitness function, statistical results, and Wilcoxon's rank test. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    The normalized random map of gradient for generating multifocus image fusion by Ismail, ., Kamarul Hawari, Ghazali

    Published 2020
    “…It successes to eliminate the mathematical and algorithm problems. Furthermore, the evaluation of proposed method based on the fused image quality. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Liquid slosh suppression by implementing data-driven fractional order PID controller based on marine predators algorithm by Mohd Zaidi, Mohd Tumari, Mohd Ashraf, Ahmad, Mohd Riduwan, Ghazali, Nik Mohd Zaitul Akmal, Mustapha, Shahrizal, Saat

    Published 2023
    “…The effectiveness of the FOPID controller tuning method based on MPA was assessed by evaluating the performance criteria in terms of convergence curve of the average fitness function, statistical results, and Wilcoxon’s rank test. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Analysis of the ECG signal using SVD-based parametric modelling technique by Baali, Hamza, Salami, Momoh Jimoh Emiyoka, Akmeliawati, Rini, Aibinu, Abiodun Musa

    Published 2011
    “…A two-stage procedure is then used to estimate the EDS model parameters. Prony’s algorithm is first used to obtain initial estimates of the model, while the Gauss-Newton method is applied to solve the non-linear least-square optimisation problem. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Optimal model order selection for Transient Error Autoregressive Moving Average (TERA) MRI reconstruction method by Aibinu, Abiodun Musa, Najeeb, Athaur Rahman, Salami, Momoh Jimoh Emiyoka, Shafie, Amir Akramin

    Published 2008
    “…These criteria were evaluated on MRI data sets based on the method of Transient Error Reconstruction Algorithm (TERA). …”
    Get full text
    Get full text
    Proceeding Paper
  13. 13
  14. 14

    Data-driven neuroendocrine-pid tuning based on safe experimentation dynamics for control of TITO coupled tank system with stochastic input delay by Mohd Riduwan, Ghazali, Mohd Ashraf, Ahmad, Raja Mohd Taufika, Raja Ismail

    Published 2019
    “…The advantages of the SED based method are that provides a fast solution, able to solve the high dimensional problem and provides high performance accuracy by keeping the best parameter value while finding the control parameters. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16

    Modelling of intelligent intrusion detection system: making a case for snort by Olanrewaju, Rashidah Funke, Ku zahir, Ku Nor Afiza, Asnawi, Ani Liza, Sanni, Mistura Laide, Ahmed, Abdulkadir Adekunle

    Published 2018
    “…This MLFNN with BP algorithm was simulated using MATLAB software. The performance of this classifier was evaluated based on three parameters: accuracy, sensitivity, and False Positive Rate (FPR). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17
  18. 18

    Predicting the popularity of tweets using the theory of point processes. by Tan, Wai Hong

    Published 2019
    “…We further propose an inhomogeneous Poisson process model and an estimation method which utilizes internal and external knowledge, based on the times of historical retweets up to the censoring time, and the complete retweet sequences in the training data set respectively. …”
    Get full text
    Get full text
    UMK Etheses
  19. 19

    EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique by Liew, Siaw Hong

    Published 2016
    “…Similarly, six feature extraction methods, i.e. Wavelet Packet Decomposition (WPD), mean of amplitude, coherence, crosscorrelation, hjorth parameter and mutual information were used construct the proposed person authentication model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Hybrid vehicle engine misfire detection using Piezo-film Sensors and analysing with Z-freq / Nor Azazi Ngatiman and Mohd Zaki Nuawi by Ngatiman, Nor Azazi, Nuawi, Mohd Zaki

    Published 2018
    “…While the second phase is signal measurement using data acquisition, filtering and analysis using Z-freq method. …”
    Get full text
    Get full text
    Article