Search Results - (( using evaluation process algorithm ) OR ( using identification using algorithm ))
Search alternatives:
- using identification »
- identification using »
- process algorithm »
- using evaluation »
- using algorithm »
-
1
System identification using Extended Kalman Filter
Published 2017“…In order to evaluate the performance of the EKF learning algorithm, the proposed algorithm validation were analyzed using model validation methods as a checker such as One Step Ahead (OSA) and correlation coefficient (R2). …”
Get full text
Get full text
Student Project -
2
Design of intelligent Qira’at identification algorithm
Published 2017“…To evaluate the algorithm, 350 samples for 10 types of Qira’at recitation are in used, and for justifying the best pattern classification, few algorithms are tested in the early preliminary evaluation with K-Nearest Neighbour, GMM and PPCA. …”
Get full text
Get full text
Thesis -
3
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…A deterministic mutation-based algorithm is introduced to overcome this problem. Identification studies using NARX (Nonlinear AutoRegressive with eXogenous input) models employing simulated systems and real plant data are used to demonstrate that the algorithm is able to detect significant variables and terms faster and to select a simpler model structure than other well-known EC methods.…”
Get full text
Get full text
Get full text
Article -
4
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…The algorithm simulates two important tasks that are frequently used by the human experts to identify summarizing strategies used to produce the summary sentences: 1) sentences relevance identification; and 2) summarizing strategies identification. …”
Get full text
Get full text
Thesis -
5
Linear-pso with binary search algorithm for DNA motif discovery / Hazaruddin Harun
Published 2015“…Evaluation of these algorithms showed that the results are unsatisfactory due to the lower validity and accuracy of these algorithms. …”
Get full text
Get full text
Thesis -
6
Linear-PSO with binary search algorithm for DNA Motif Discovery / Hazaruddin Harun
Published 2015“…Evaluation of these algorithms showed that the results are unsatisfactory due to the lower validity and accuracy of these algorithms. …”
Get full text
Get full text
Book Section -
7
Identification of continuous-time hammerstein model using improved archimedes optimization algorithm
Published 2024“…The process was evaluated using a numerical example and two practical experiments [twin-rotor system (TRS) and electro-mechanical positioning system (EMPS)]. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. …”
Get full text
Get full text
Get full text
Thesis -
9
Musical instrument identification using Convolutional Neural Network (CNN) algorithm / Muhammad Nur Azri Irfan Abdul Rahman
Published 2025“…The motivation behind the project was to help automate the cumbersome task of validating instruments from images using Convolutional Neural Network (CNNs) algorithm to identify the musical instrument so that this task could be completed with higher accuracy. …”
Get full text
Get full text
Thesis -
10
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…The second modification develops a new position update mechanism using the Bat Algorithm movement. The third modification improves the controlled parameter of the MBGWO algorithm using indicators from the search process to refine the solution. …”
Get full text
Get full text
Thesis -
11
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. The methodology used in this study begun with problem identification, requirement identification, analysed the model process and design the simulation model. …”
Get full text
Get full text
Get full text
Thesis -
12
An improved fast scanning algorithm based on distance measure and threshold function in region image segmentation
Published 2016“…The clustering process in Fast Scanning algorithm is performed by merging pixels with similar neighbor based on an identified threshold and the use of Euclidean Distance as distance measure. …”
Get full text
Get full text
Get full text
Thesis -
13
Flow regime identification of particles conveying in pneumatic pipeline using electric charge tomography and neural network techniques
Published 2006“…A high speed data acquisition card DAS1800HC is used to interface the sensors to a personal computer which processes the data using linear back projection algorithm (LBPA) and filtered back projection algorithm (FBPA). …”
Get full text
Get full text
Thesis -
14
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
Get full text
Get full text
Thesis -
15
Application of system identification method coupled with evolutionary algorithms for the optimization of power consumption in a pem fuel cell propulsion system / Suhadiyana Hanapi
Published 2018“…Three alternative configurations of a vehicle system were considered namely, without DC/DC converter, with DC/DC converter on the supercapacitors side and with DC/DC converter on the PEM fuel cell side. In the process of evaluating the best system configuration, Multi-Criteria Decision Making technique (MCDM) through the Analytical Hierarchy Process (AHP), was used for evaluation, comparison and applicability assessment. …”
Get full text
Get full text
Book Section -
16
A COLLABORATIVE FRAMEWORK FOR ANDROID MALWARE IDENTIFICATION USING DYNAMIC ANALYSIS
Published 2019“…The Correlationbased Feature Selection Evaluator (CfsSubset) algorithm is applied in feature selection process in order to improve the classification process. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
17
Nonlinear auto-regressive model structure selection using binary particle swarm optimization algorithm / Ahmad Ihsan Mohd Yassin
Published 2014“…The algorithm searches the solution space by selecting various model structures and evaluating its fitness. …”
Get full text
Get full text
Thesis -
18
An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization
Published 2019“…We then evaluated the Improved AKF algorithm with the-state-of-the-art algorithms in terms of compression ratio using Paul videos and Shih-Tang dataset. …”
Get full text
Get full text
Article -
19
An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif
Published 2016“…Soft computing techniques, such as bio-inspired algorithms, can be used for information processing by employing methods which are capable to deal with imprecision and uncertainty. …”
Get full text
Get full text
Research Reports -
20
Analysis of Toothbrush Rig Parameter Estimation Using Different Model Orders in Real Coded Genetic Algorithm (RCGA)
Published 2024“…Generation gap used was 0.5 has shorten the algorithm conver-gence time without affecting the model accuracy.…”
Article
