Search Results - (( parameter estimation age algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- java application »
- estimation age »
- age algorithm »
- parameter »
-
1
Comparison of machine learning algorithms for estimating mangrove age using sentinel 2A at Pulau Tuba, Kedah, Malaysia / Fareena Faris Francis Singaram
Published 2021“…The parameters involved to estimate the mangrove age are differences feature selection and different supervised machine learning algorithm. …”
Get full text
Get full text
Thesis -
2
Age Estimation of Cellulose Paper Insulation in Power Transformers Using ANN
Published 2023Conference Paper -
3
State-of-Charge Estimation of Li-Ion Battery in Electric Vehicles: A Deep Neural Network Approach
Published 2023Conference Paper -
4
Three-dimensional craniometrics identification model and cephalic index classification of Malaysian sub-adults: A multi-slice computed tomography study / Sharifah Nabilah Syed Mohd...
Published 2024“…All the age groups, except for 0–2 years and 3–6 years, exhibited reliable sex estimation with a high accuracy percentage (≥75%) when tested using DFA and BLR. …”
Get full text
Get full text
Get full text
Thesis -
5
Reproducing kernel Hilbert space method for cox proportional hazard model
Published 2016“…This algorithm is used to determine the vector i a that enables us to find the optimal parameters of ƒ(x)which is simplified as F(x)= ∑aᵢK(x,xᵢ) . …”
Get full text
Get full text
Get full text
Thesis -
6
Bayesian logistic regression model on risk factors of type 2 diabetes mellitus
Published 2016“…The significant variables determined by maximum likelihood method were then estimated using the BLR method. The BLR approach via Gibbs sampler and the random walk metropolis algorithm suggests that family history of diabetes, waist circumference and the body mass index are the significant risk factors associated with the type 2 diabetes mellitus. …”
Get full text
Get full text
Thesis -
7
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
8
Applications of contemporary artificial intelligence technology in forensic odontology as primary forensic identifier : A scoping review
Published 2022“…Results: The potential application of artificial intelligence technology in forensic odontology can be categorized into four: (1) human bite marks, (2) sex determination, (3) age estimation, and (4) dental comparison. This powerful tool can solve humanity's problems by giving an adequate number of datasets, the appropriate implementation of algorithm architecture, and the proper assignment of hyperparameters that enable the model to perform the prediction at a very high level of performance. …”
Get full text
Get full text
Get full text
Article -
9
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…To enhance the selection of most highly ranking features, irrelevant features are ‘pruned’ based on determined boundary threshold. In order to estimate the quality of ‘pruned’ features, self-adaptive DE algorithm is proposed. …”
Get full text
Get full text
Thesis -
10
-
11
-
12
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
-
14
Mathematical modeling of brain tumor cell growth for passive, active and oxygen transport mechanism with microgravity condition / Norfarizan Mohd Said
Published 2018“…The image processing technique known as Enhanced Distance Active Contour (EDAC) are utilized in edge detection of the MRI images to get the parameter estimations for comparison with the model simulations. …”
Get full text
Get full text
Thesis
