Search Results - (( parameter detection method algorithm ) OR ( _ continuous function algorithm ))*

Refine Results
  1. 1

    Heart disease prediction using artificial neural network with ADAM optimization and harmony search algorithm by Alyaa Ghazi Mohammed, Mohd Zakree Ahmad Nazri

    Published 2025
    “…The ADAM optimizer effectively tackles challenges in continuous parameter optimization by dynamically updating the model's weights and biases, adapting the learning rate for each parameter based on accumulated historical gradient information to achieve more efficient minimization of the loss function during training. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Safe experimentation dynamics algorithm for identification of cupping suction based on the nonlinear Hammerstein model by Kavindran, Suresh, Mohd Riduwan, Ghazali, Mohd Ashraf, Ahmad

    Published 2023
    “…The research contribution lies in utilizing the SED algorithm to tune the parameters of the Hammerstein model specifically for the cupping suction system and figure out the real system with a continuous-time transfer function. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Modelling of cupping suction system based on system identification method by Suresh, Kavindran, Ghazali, M. R., Ahmad, M. A.

    Published 2022
    “…In contrast, the input variable is determined by the speed of the pump applied in various locations. The transfer function model also makes use of the continuous-time transfer function.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Integrated geophysical, hydrogeochemical and artificial intelligence techniques for groundwater study in the Langat Basin, Malaysia / Mahmoud Khaki by Mahmoud, Khaki

    Published 2014
    “…These results confirm that, for all the networks the Levenberg-Marquardt algorithm is the most effective algorithm to model the groundwater level. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Modeling of cupping suction system based on system identification method by Kavindran, Suresh

    Published 2022
    “…The transfer function model also makes use of a continuous-time transfer function. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    Operational structural damage identification using de-noised modal feature in machine learning / Chen Shilei by Chen , Shilei

    Published 2021
    “…Meanwhile, the unsupervised learning method using PCA-WCC features is good at detecting unknown damage, and is sensitive to low-severity damage. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor by Adilah, Abdul Ghapor

    Published 2017
    “…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam by Fayyadh, M.M., Abdul Razak, H.

    Published 2011
    “…This study verifies the use of the proposed weighting method by Fayyadh and Abdul Razak (2011a) for damage detection algorithms applied on cracked steel beam. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
    Get full text
    Get full text
    Thesis
  12. 12

    Nonlinear response prediction of spar platform using artificial neural network / Md. Alhaz Uddin by Md. Alhaz , Uddin

    Published 2012
    “…A hyperbolic tangent function is considered in the present study as an activation function. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Improved intrusion detection algorithm based on TLBO and GA algorithms by Aljanabi, Mohammad, Mohd Arfian, Ismail

    Published 2021
    “…The NTLBO was proposed in this paper as an FSS mechanism; its algorithm-specific, parameter-less concept (which requires no parameter tuning during an optimization) was explored. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    The development of Muscle Fatigue Prediction model from muscle torque and contraction data / Keshasni Earichappan by Keshasni , Earichappan

    Published 2023
    “…The growing need for a reliable method for assessing muscle function continues to facilitate further research into other alternatives. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Outlier detection in circular regression model using minimum spanning tree method by Nur Faraidah, Muhammad Di, Siti Zanariah, Satari, Roslinazairimah, Zakaria

    Published 2019
    “…The existence of outliers in a circular regression model can lead to many errors, for example in inferences and parameter estimations. Therefore, this study aims to develop new algorithms that can detect outliers by using the minimum spanning tree method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali by Wan Ghazali, Wan Nurdayini Batrisyia

    Published 2024
    “…The key concern of this thesis is to determine the influence of flying height parameters on crack detection using UAVs. Looking at the current scenario of development and the age of the structures in urban areas, there is a high significance of efficient and accurate building inspection methods. …”
    Get full text
    Get full text
    Student Project
  19. 19

    Fuzzy modelling using butterfly optimization algorithm for phishing detection by Noor Syahirah, Nordin, Mohd Arfian, Ismail, Nurul Aswa, Omar

    Published 2020
    “…To generate the fuzzy parameter automatically, an optimization method is required and Butterfly Optimization Algorithm (BOA) is one of the good methods to be applied. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm by Yap K.S., Abidin I.Z., Ahmad A.R., Hussien Z.F., Pok H.L., Ismail F.I., Mohamad A.M.

    Published 2023
    “…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
    Conference Paper