Search Results - (( using function method algorithm ) OR ( data normalization _ algorithm ))
Search alternatives:
- data normalization »
- method algorithm »
- function method »
- using function »
-
1
Statistical data preprocessing methods in distance functions to enhance k-means clustering algorithm
Published 2018“…We introduced two new approaches to normalization techniques to enhance the K-Means algorithms. …”
Get full text
Get full text
Get full text
Thesis -
2
Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring
Published 2021“…Thus, in this thesis, a new Smart Energy Meter (SEM) with adaptive data transfer algorithm is designed to accommodate the problem. …”
Get full text
Get full text
Thesis -
3
Improved expectation maximization algorithm for Gaussian mixed model using the kernel method
Published 2013“…Finally, for illustration, we apply the improved algorithm to real telecommunication data. The modified method will pave the way to introduce a comprehensive method for detecting fraud calls in future work.…”
Get full text
Get full text
Get full text
Article -
4
Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms
Published 2020“…In the sizing of the SAPV system, the mutation adaptive DE (MADE) algorithm based multi-objective functions minimizes three constraint objective functions. …”
Get full text
Get full text
Thesis -
5
Feature fusion using a modified genetic algorithm for face and signature recognition system
Published 2015“…Several approaches and benchmark data were used to validate the effectiveness of the proposed method compared to the unimodal system and normal feature selection method. …”
Get full text
Get full text
Thesis -
6
Logic Programming In Radial Basis Function Neural Networks
Published 2013“…I used different types of optimization algorithms to improve the performance of the neural networks. …”
Get full text
Get full text
Thesis -
7
Comparison between Newton’s Method and a new Scaling Newton Method / Ramizah Baharuddin
Published 2021“…Newton's Method also called the Newton-Raphson method is a recursive algorithm for approximating the root of a differentiable function. …”
Get full text
Get full text
Thesis -
8
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
Published 2014“…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
Get full text
Get full text
Get full text
Thesis -
9
A Method for Mapping XML DTD to Relational Schemas In The Presence Of Functional Dependencies
Published 2008“…This concept is used to specify the constraints that may exist in the relations and guide the design while removing semantic data redundancies. This approach leads to a good normalized relational schema without data redundancy. …”
Get full text
Get full text
Thesis -
10
A new variant of black hole algorithm based on multi population and levy flight for clustering problem
Published 2020“…The obtained results were compared with the BH and previous optimization algorithms for both test functions as well as data clustering in terms of normal and high dimensional datasets. …”
Get full text
Get full text
Thesis -
11
Optimization and control of hydro generation scheduling using hybrid firefly algorithm and particle swarm optimization techniques
Published 2018“…The proposed methods tested on raw data of hydropower plant of Himreen Lake Dam. …”
Get full text
Get full text
Thesis -
12
Improved static and dynamic FBG sensor system for real-time monitoring of composite structures
Published 2017“…Thus, the designation of this research study is to improve the current FBG based real-time monitoring system with the use of certain functions and algorithms, that are the instant mesh-grid function, voltage normalization algorithm, CC-LSL algorithm, and FFT function. …”
Get full text
Get full text
Thesis -
13
A study on one way hashing function and its application for FTMSK webmail / Noor Hasimah Ibrahim Teo
Published 2005“…Password is a normal way for securing data from intruders. The widespread use of password is in email account. …”
Get full text
Get full text
Thesis -
14
Automatic database of robust neural network forecasting / Saadi Ahmad Kamaruddin, Nor Azura Md. Ghani and Norazan Mohamed Ramli
Published 2014“…The direct idea of making the conventional neural network learning algorithm more powerful towards outlying data is by replacing the mean square error (MSE) with a different symmetric and continuous cost function. …”
Get full text
Get full text
Get full text
Book Section -
15
Handgrip strength evaluation using neuro fuzzy approach
Published 2010“…The expert rules define the membership function for the fuzzy system. The fuzzy model based on the membership function, fed in by the neural network will intelligently classify the data. …”
Get full text
Get full text
Article -
16
A comparison of support vector machine and decision tree classifications using satellite data of Langkawi Island
Published 2009“…The study indicates that the classification accuracy of SVM algorithm was better than DT algorithm. The overall accuracy of the SVM using four kernel types was above 73% and the overall accuracy of the DT method was 69%. …”
Get full text
Get full text
Get full text
Article -
17
Fault identification in pipeline system using normalized hilbert huang transform and automatic selection of intrinsic mode function
Published 2018“…This paper proposed to apply Integrated Kurtosis-based Algorithm for z-filter Technique (Ikaz) for that allows automatic selection of intrinsic mode function (IMF) that’s should be used. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique
Published 2018“…However, this method has the difficulty in selecting the suitable IMF for the next data post-processing method, which is Hilbert Transform (HT). …”
Get full text
Get full text
Thesis -
19
Forensic language of property theft genre based on mathematical formulae and machine learning algorithms / Hana' Abd Razak
Published 2020“…Four traits was discovered namely spine, pelvis, knee and ankle. Next, data collection of normal and anomalous behaviour is collected using Kinect sensor. …”
Get full text
Get full text
Thesis -
20
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Anderson-Darling (AD) and Goodness of Fit test is used to identify the best fitted distribution model to the real data. …”
Get full text
Get full text
Article
