Search Results - (( data internalization based algorithm ) OR ( parameter evaluation method algorithm ))
Search alternatives:
- internalization based »
- data internalization »
- parameter evaluation »
- evaluation method »
- method algorithm »
-
1
Comparison of Logistic Regression, Random Forest, SVM, KNN Algorithm for Water Quality Classification Based on Contaminant Parameters
Published 2024“…The purpose of this study is to evaluate and compare the performance of these algorithms in terms of accuracy. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Evaluation of Lightning Current Using Inverse Procedure Algorithm.
Published 2013“…The proposed method considers on all electromagnetic fields components and can evaluate full shape of current, velocity and constant parameters of current models in contrast with previous studies. …”
Get full text
Get full text
Article -
3
Analysis of toothbrush rig parameter estimation using different model orders in Real-Coded Genetic Algorithm (RCGA)
Published 2018“…The influence of conventional genetic algorithm parameter - generation gap has been investigated too. …”
Get full text
Article -
4
Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal
Published 2006“…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Conference or Workshop Item -
5
Analysis of Toothbrush Rig Parameter Estimation Using Different Model Orders in Real Coded Genetic Algorithm (RCGA)
Published 2024“…The influence of conventional genetic algorithm parameter - generation gap has been investigated too. …”
Article -
6
Autism Spectrum Disorder Classification Using Deep Learning
Published 2021“…Finally, the effectiveness of the algorithm is evaluated based on the accuracy performance. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal
Published 2006“…Lecturer workload at universities includes three major categories: teaching, research and services.Teaching workload is influence by various factors such as level taught courses, number of student, credit and contact hour and off campus or on campus course design.The UPM has a KM Portal that contains sets of metadata on lecturer profile and knowledge assets.The Lecturer profile contains information lecturer teaching, research, publication and many more.We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload.This method measures the lecturer teaching workload.The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset.Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Liquid slosh suppression by implementing data-driven fractional order pid controller based on marine predators algorithm
Published 2023“…The effectiveness of the FOPID controller tuning method based on MPA was assessed by evaluating the performance criteria in terms of convergence curve of the average fitness function, statistical results, and Wilcoxon's rank test. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
The normalized random map of gradient for generating multifocus image fusion
Published 2020“…It successes to eliminate the mathematical and algorithm problems. Furthermore, the evaluation of proposed method based on the fused image quality. …”
Get full text
Get full text
Get full text
Article -
10
Liquid slosh suppression by implementing data-driven fractional order PID controller based on marine predators algorithm
Published 2023“…The effectiveness of the FOPID controller tuning method based on MPA was assessed by evaluating the performance criteria in terms of convergence curve of the average fitness function, statistical results, and Wilcoxon’s rank test. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Analysis of the ECG signal using SVD-based parametric modelling technique
Published 2011“…A two-stage procedure is then used to estimate the EDS model parameters. Prony’s algorithm is first used to obtain initial estimates of the model, while the Gauss-Newton method is applied to solve the non-linear least-square optimisation problem. …”
Get full text
Get full text
Get full text
Proceeding Paper -
12
Optimal model order selection for Transient Error Autoregressive Moving Average (TERA) MRI reconstruction method
Published 2008“…These criteria were evaluated on MRI data sets based on the method of Transient Error Reconstruction Algorithm (TERA). …”
Get full text
Get full text
Proceeding Paper -
13
-
14
Data-driven neuroendocrine-pid tuning based on safe experimentation dynamics for control of TITO coupled tank system with stochastic input delay
Published 2019“…The advantages of the SED based method are that provides a fast solution, able to solve the high dimensional problem and provides high performance accuracy by keeping the best parameter value while finding the control parameters. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
-
16
Modelling of intelligent intrusion detection system: making a case for snort
Published 2018“…This MLFNN with BP algorithm was simulated using MATLAB software. The performance of this classifier was evaluated based on three parameters: accuracy, sensitivity, and False Positive Rate (FPR). …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
Optimal model order selection for transient error autoregressive moving average (TERA) MRI reconstruction method
Published 2008“…These criteria were evaluated on MRI data sets based on the method of Transient Error Reconstruction Algorithm (TERA). …”
Get full text
Get full text
Get full text
Article -
18
Predicting the popularity of tweets using the theory of point processes.
Published 2019“…We further propose an inhomogeneous Poisson process model and an estimation method which utilizes internal and external knowledge, based on the times of historical retweets up to the censoring time, and the complete retweet sequences in the training data set respectively. …”
Get full text
Get full text
UMK Etheses -
19
EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique
Published 2016“…Similarly, six feature extraction methods, i.e. Wavelet Packet Decomposition (WPD), mean of amplitude, coherence, crosscorrelation, hjorth parameter and mutual information were used construct the proposed person authentication model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Hybrid vehicle engine misfire detection using Piezo-film Sensors and analysing with Z-freq / Nor Azazi Ngatiman and Mohd Zaki Nuawi
Published 2018“…While the second phase is signal measurement using data acquisition, filtering and analysis using Z-freq method. …”
Get full text
Get full text
Article
