Search Results - (( software identification using algorithm ) OR ( using selection method algorithm ))
Search alternatives:
- software identification »
- identification using »
- selection method »
- method algorithm »
- using algorithm »
- using selection »
-
1
System identification using Extended Kalman Filter
Published 2017“…In order to evaluate the performance of the EKF learning algorithm, the proposed algorithm validation were analyzed using model validation methods as a checker such as One Step Ahead (OSA) and correlation coefficient (R2). …”
Get full text
Get full text
Student Project -
2
Discrete-Time System Identification Based On Novel Information Criterion Using Genetic Algorithm
Published 2017“…Genetic algorithm (GA) as a popular search method, is used for selecting a model structure. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Comparison Of Crossover In Genetic Algorithm For Discrete-Time System Identification
Published 2021“…Genetic algorithm (GA), a method known for optimisation is used for selecting a model structure. …”
Get full text
Get full text
Get full text
Article -
4
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…Subsequently, Canny edge detection algorithm is selected as an efficient algorithm based on the comparison made and it is further used in this project. …”
Get full text
Get full text
Final Year Project -
5
Weighted Sum-Dijkstra’s Algorithm in Best Path Identification based on Multiple Criteria
Published 2018“…In order to achieve the objective, Weighted Sum-Dijkstra’s Algorithm (WSDA), a combination method between WSM and Dijkstra’s Algorithm is applied to solve multiple criteria network problems. …”
Get full text
Get full text
Get full text
Article -
6
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…Optimization algorithms are widely used for the identification of intrusion. …”
Get full text
Get full text
Get full text
Article -
7
A COLLABORATIVE FRAMEWORK FOR ANDROID MALWARE IDENTIFICATION USING DYNAMIC ANALYSIS
Published 2019“…The Correlationbased Feature Selection Evaluator (CfsSubset) algorithm is applied in feature selection process in order to improve the classification process. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
8
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. …”
Get full text
Get full text
Thesis -
9
Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman
Published 2022“…Plus, to analyse the efficiency of a detection model on keylogger dataset by evaluating a selection of attributes. Besides, to test the accuracy of detection models on keylogger dataset comparing two machine learning algorithms. …”
Get full text
Get full text
Student Project -
10
The comparative study of model-based and appearance based gait recognition for leave bag behind
Published 2018“…In this research, the analysis performed using two methods which are Model-Based approaches and Appearance-Based approaches. …”
Get full text
Get full text
Get full text
Thesis -
11
Frontal View Gait Recognition With Fusion of Depth Features From a Time of Flight Camera
Published 2019“…The data set includes two sessions recorded seven months apart, with 46 and 33 subjects, respectively, each with six walks with five covariates. The four-part method includes: a new human silhouette extraction algorithm that reduces the multiple reflection problem experienced by ToF cameras; a frame selection method based on a new gait cycle detection algorithm; four new gait image representations; and a novel fusion classifier. …”
Get full text
Get full text
Get full text
Article -
12
The comparative study of model-based and appearance Based gait recognition for leave bag behind
Published 2018“…In this research, the analysis perfonned using two methods which are Model-Based approaches and Appearance-Based approaches. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Optimization of process parameters for pyrolsis of waste plastics by T method-1
Published 2023text::Final Year Project -
14
Energy, Vibration And Sound Research Group (e-VIBS) School Of Science And Technology Universiti Malaysia Sabah : Bioacoustics Signal Modeling Using Time-Frequency Distribution
Published 2011“…In conclusion, this work has successfully developed the species identification system based on bioacoustics signals by using the concept of WE. By comparing to the reference methods (conventional or classical methods), this study has proven that the performance of the bioacoustics species identification system can be improved by using the entropy approach with association of WT. …”
Get full text
Get full text
Get full text
Research Report -
15
Multi-stage feature selection in identifying potential biomarkers for cancer classification
Published 2022“…Therefore, this study aims to investigate and develop a better feature selection to identify potential biomarkers from gene expression data and construct a deep neural network classification model using these selected features. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…This research was undertaken to develop methods to mitigate shoulder-surfing attack. Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
17
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. …”
Get full text
Get full text
Get full text
Thesis -
18
Three-dimensional craniometrics identification model and cephalic index classification of Malaysian sub-adults: A multi-slice computed tomography study / Sharifah Nabilah Syed Mohd...
Published 2024“…Discriminant function analysis (DFA), binary logistic regression (BLR), and several machine learning (ML) algorithms (random forest (RF), support vector machines (SVM), and linear discriminant analysis (LDA)) were used to statistically analyse the data. …”
Get full text
Get full text
Get full text
Thesis -
19
Thermoelectric cooler identification based on continuous-time hammerstein model using metaheuristics algorithm
Published 2021Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Register Transfer Level Implementation Of Pooling - Based Feature Extraction For Finger Vein Identification
Published 2017“…The proposed algorithm extracted the local feature information of the finger vein pattern (patches), and used these patches to improve the robustness of the identification. …”
Get full text
Get full text
Thesis
