Search Results - (( outside evaluation method algorithm ) OR ( using codification using algorithm ))

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    The Determination of Pile Capacity Using Artificial Neural-net: An Optimization Approach by Ab. Malik, Rosely, Jamil S., Mohamed

    Published 2001
    “…Using the developed algorithm, the safety measures involved are such as reliability index and the probability of failure; instead of only factor of safety if conventional deterministic approach is used. …”
    Get full text
    Get full text
    Article
  2. 2

    An efficient anomaly intrusion detection method with feature selection and evolutionary neural network by Sarvari, Samira, Mohd Sani, Nor Fazlida, Mohd Hanapi, Zurina, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…Moreover, the value of the solution is evaluated based on the objective function and the Fuzzy C Means (FCM) clustering method used to provide the best results for the overlapping dataset and create the fuzzy membership search domain which includes all possible compromise solutions. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Interpolation and extrapolation techniques based Neural Network in estimating the missing ionospheric TEC data by Jayapal V., Zain A.F.M.

    Published 2024
    “…Normalized RMSE, RMSE and relative correction are computed for both methods to evaluate the capability of NN to interpolate and extrapolate the missing data. …”
    Conference Paper
  5. 5

    A novel method for vegetation encroachment monitoring of transmission lines using a single 2D camera by Ahmad, Junaid, Malik, Aamir Saeed, Abdullah, Mohd Faris, Kamel, Nidal S., Xia, Likun

    Published 2015
    “…excess vegetation encroachments within and outside ROWs. The performance evaluation of a real time developed test-bed scenario proves the feasibilities of integrating the method for transmission line maintenance.…”
    Get full text
    Get full text
    Article
  6. 6

    Discriminative feature representation for Malay children’s speech recognition / Seyedmostafa Mirhassani by Mirhassani, Seyedmostafa

    Published 2015
    “…In case of multiple filterbanks the cepstral features are used in different experts for performing classification based on different representation of speeches. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Industrial datasets with ICS testbed and attack detection using machine learning techniques by Mubarak, Sinil, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Balla, Asaad, Tahir, Mohammad, Elsheikh, Elfatih A A, Suliman, F M

    Published 2021
    “…The performance metrics such as accuracy, precision, recall, F1 score are evaluated and cross validated for different ML algorithms for anomaly detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    State-of-charge estimation for lithium-ion batteries with optimized self-supervised transformer deep learning model by Dickson Neoh Tze How, Dr.

    Published 2023
    “…The evaluation is carried out based on multiple electric vehicles (EV) drive cycles with different Li-ion cells chemistry at varying ambient temperatures. …”
    text::Thesis