Search Results - (( using computing data algorithm ) OR ( software identification method algorithm ))
Search alternatives:
- software identification »
- identification method »
- method algorithm »
- using computing »
- computing data »
- data algorithm »
-
1
System identification using Extended Kalman Filter
Published 2017“…System identification is getting more intensive from researcher to develop an algorithm with work efficiently and more accurate. …”
Get full text
Get full text
Student Project -
2
-
3
Comparison Of Crossover In Genetic Algorithm For Discrete-Time System Identification
Published 2021“…This was carried out using a computational software on a number of simulated data. …”
Get full text
Get full text
Get full text
Article -
4
Autoreclosure in Extra High Voltage Lines using Taguchi's Method and Optimized Neural Networks
Published 2009“…The fault identification prior to reclosing is based on optimized artificial neural network associated with standard Error Back-Propagation, Levenberg Marquardt Algorithm and Resilient Back-Propagation training algorithms together with Taguchi’s Method. …”
Get full text
Get full text
Conference or Workshop Item -
5
Fuzzy modelling using firefly algorithm for phishing detection
Published 2019“…One of the suitable methods provides the Firefly Algorithm (FA). FA is a nature-inspired algorithm that uses fireflies’ behavior to interpret data. …”
Get full text
Get full text
Get full text
Article -
6
-
7
Cabbage disease detection system using k-NN algorithm
Published 2022Get full text
Get full text
Get full text
Academic Exercise -
8
-
9
Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman
Published 2022“…Early identification of a keylogger malware attack could prevent hackers from accessing personal user data and reduce the likelihood of infiltration, which could reveal account information, credit cards, usernames, passwords, and other data. …”
Get full text
Get full text
Student Project -
10
-
11
A COLLABORATIVE FRAMEWORK FOR ANDROID MALWARE IDENTIFICATION USING DYNAMIC ANALYSIS
Published 2019Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
12
-
13
Development of thumbprint recognition system using Matlab / Wan Hasnizam Wan Hassan
“…Biometric is a technology, which identifies a person based on his physiology or behavioral characteristics. Thumbprint identification and recognition is one of the biometrics method available that has been widely used in various applications because of it is reliability and accuracy in the process of recognizing and verifying a person identity. …”
Get full text
Get full text
Student Project -
14
-
15
Analysis of Traffic Accident Patterns Using Association Rule Mining
Published 2024“…This study analyzed the levels of minor, moderate, and severe traffic accidents in the Palembang Police area from 2015 to 2020 using association rule mining and the apriori algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
-
17
Real time self-calibration algorithm of pressure sensor for robotic hand glove system
Published 2019“…The proposed method was achieved using one-hour calibration data set of pressure sensor in real time. …”
Get full text
Get full text
Thesis -
18
-
19
Energy, Vibration And Sound Research Group (e-VIBS) School Of Science And Technology Universiti Malaysia Sabah : Bioacoustics Signal Modeling Using Time-Frequency Distribution
Published 2011“…To establish a base trial data, the widely used spectral centroid (SC) and wavelet centroid (WC) were used as reference. …”
Get full text
Get full text
Get full text
Research Report -
20
Three-dimensional craniometrics identification model and cephalic index classification of Malaysian sub-adults: A multi-slice computed tomography study / Sharifah Nabilah Syed Mohd...
Published 2024“…Discriminant function analysis (DFA), binary logistic regression (BLR), and several machine learning (ML) algorithms (random forest (RF), support vector machines (SVM), and linear discriminant analysis (LDA)) were used to statistically analyse the data. …”
Get full text
Get full text
Get full text
Thesis
