Search Results - (( parameter identification method algorithm ) OR ( using classification based algorithm ))

Refine Results
  1. 1

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Improved intrusion detection algorithm based on TLBO and GA algorithms by Aljanabi, Mohammad, Mohd Arfian, Ismail

    Published 2021
    “…Optimization algorithms are widely used for the identification of intrusion. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh by Rawaa Dawoud Hassan, Al-Dabbagh

    Published 2015
    “…ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Classification of labour pain using electroencephalogram signal based on wavelet method / Sai Chong Yeh by Sai , Chong Yeh

    Published 2020
    “…The training and parameters selection of the machine learning algorithms are conducted using EEG data collected from ten subjects in the laboratory. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Plant leaf recognition algorithm using ant colony-based feature extraction technique by Ghasab, Mohammad Ali Jan

    Published 2013
    “…To do this, at first, based on the proposed algorithm,the physiological dimensions of leaves are automatically measured and with regard to these parameters, specified features such as shape, morph, texture and colour are extracted from the image of the plant leaf through image processing to create a reserved feature database to be used for different species of plants. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Tree-based contrast subspace mining method by Florence Sia Fui Sze

    Published 2020
    “…The research works involve first preparing the real world numerical and categorical data sets. Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…After evaluating the results of these algorithms, a hybrid Artificial Neural Network-based Imperial Competitive Algorithm (ANN-ICA) was presented in the deployment step of the proposed methodology to identify the structural damage of illustrative structures. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Fault classification in smart distribution network using support vector machine by Chuan O.W., Ab Aziz N.F., Yasin Z.M., Salim N.A., Wahab N.A.

    Published 2023
    “…In this paper, a machine-learning algorithm known as Support Vector Machine (SVM) for fault type classification in distribution system has been developed. …”
    Article
  10. 10

    Handgrip strength evaluation using neuro fuzzy approach by Seng, W.C., Chitsaz, M.

    Published 2010
    “…Handgrip assessment is a useful method to monitor patient rehabilitation. The neurofuzzy analysis provides system identification and interpretability of fuzzy models and learning capability of neural networks. …”
    Get full text
    Get full text
    Article
  11. 11

    Signal quality measures for pulse oximetry through waveform morphology analysis by Sukor, J. Abdul, Redmond, S. J., Lovell, N. H.

    Published 2011
    “…The performance of the algorithm was assessed using Cohen’s kappa coefficient (κ), sensitivity, specificity and accuracy measures. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Context enrichment framework for sentiment analysis in handling word ambiguity resolution by Yusof, Nor Nadiah

    Published 2024
    “…The similarity between ambiguous words and their context words is evaluated using the cosine similarity approach. A rule-based method is introduced to select context words based on their similarity. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Detection of sweetness level for fruits (watermelon) with machine learning by Wan Nazulan, Wan Nurul Suraya, Asnawi, Ani Liza, Mohd Ramli, Huda Adibah, Jusoh, Ahmad Zamani, Ibrahim, Siti Noorjannah, Mohamed Azmin, Nor Fadhillah

    Published 2020
    “…The objective of this work is to investigate the sweetness parameter for the fruit’s detection and classification algorithm in machine learnings. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Hybrid DE and PEM algorithm for identification of small scale Autonomous helicopter model by Legowo, Ari

    Published 2012
    “…The proposed hybrid identification method explored the evolutionary search optimization strength of DE for parameter initialization for PEM identification algorithm…”
    Get full text
    Get full text
    Monograph
  15. 15

    MULTIVARIABLE CLOSED-LOOP SYSTEM IDENTIFICATION USING ITERATIVE LEAKY LEAST MEAN SQUARES METHOD by MOHAMED OSMAN, MOHAMED ABDELRAHIM

    Published 2017
    “…Channel isolation usmg partial correlation analysis and estimation of model parameters in the conventional multivariable closed-loop system identification approaches use the method of Least Square (LS) with the limitations, viz. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Recursive Subspace Identification Algorithm Using The Propagator Based Method by Jamaludin, Irma Wani, Abdul Wahab, Norhaliza

    Published 2017
    “…In this paper, the recursive subspace identification algorithm based on the propagator method which avoids the SVD computation is proposed. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Robust techniques for linear regression with multicollinearity and outliers by Mohammed, Mohammed Abdulhussein

    Published 2016
    “…We call these methods the Latent Root MMbased (LRMMB) and the Latent Root MGM-based (LRMGMB) methods. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Parameter identification of thermoelectric modules using enhanced slime mould algorithm (ESMA) by Ponnalagu, Dharswini, Mohd Ashraf, Ahmad, Jui, Julakha Jahan

    Published 2024
    “…The proposed method incorporates a pair of modifications to the standard slime mould algorithm (SMA). …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Spectral and prosodic feature extractions for classical Arabic accents recognition among Malay speakers / Noor Jamaliah Ibrahim by Noor Jamaliah , Ibrahim

    Published 2021
    “…Therefore, it can be concluded that, integrating the prosodic and spectral features of MFCC, and incorporated with GMM-UBM classification in ASR system, outperforms other algorithms tested in this research. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Hybrid intelligent methods for parameter identification and load frequency control in power system by Aqeel Sakhy, Jaber

    Published 2014
    “…For example, the classical methods for parameter identification (LSE and MLE), the classical methods for LFC (PI, PD and PID) and the intelligent methods (fuzzy logic, neural network, genetic algorithm, and PSO). …”
    Get full text
    Get full text
    Thesis