Search Results - (( using selection method algorithm ) OR ( software identification using algorithm ))

Refine Results
  1. 1

    System identification using Extended Kalman Filter by Alias, Ahmad Hafizi

    Published 2017
    “…In order to evaluate the performance of the EKF learning algorithm, the proposed algorithm validation were analyzed using model validation methods as a checker such as One Step Ahead (OSA) and correlation coefficient (R2). …”
    Get full text
    Get full text
    Student Project
  2. 2
  3. 3

    Comparison Of Crossover In Genetic Algorithm For Discrete-Time System Identification by Zainuddin, Farah Ayiesya, Abd Samad, Md Fahmi

    Published 2021
    “…Genetic algorithm (GA), a method known for optimisation is used for selecting a model structure. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Edge Detection Algorithm For Image Processing Of Search And Rescue Robot by A/L Sivem, Prasanthran

    Published 2016
    “…Subsequently, Canny edge detection algorithm is selected as an efficient algorithm based on the comparison made and it is further used in this project. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Weighted Sum-Dijkstra’s Algorithm in Best Path Identification based on Multiple Criteria by Ting, Kien Hua, Noraini Abdullah

    Published 2018
    “…In order to achieve the objective, Weighted Sum-Dijkstra’s Algorithm (WSDA), a combination method between WSM and Dijkstra’s Algorithm is applied to solve multiple criteria network problems. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Improved intrusion detection algorithm based on TLBO and GA algorithms by Aljanabi, Mohammad, Mohd Arfian, Ismail

    Published 2021
    “…Optimization algorithms are widely used for the identification of intrusion. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A COLLABORATIVE FRAMEWORK FOR ANDROID MALWARE IDENTIFICATION USING DYNAMIC ANALYSIS by Thayaaleni, Rajandran

    Published 2019
    “…The Correlationbased Feature Selection Evaluator (CfsSubset) algorithm is applied in feature selection process in order to improve the classification process. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  8. 8

    Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh by Rawaa Dawoud Hassan, Al-Dabbagh

    Published 2015
    “…ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman by Abdul Rahman, Muhammad Faiz Hazim

    Published 2022
    “…Plus, to analyse the efficiency of a detection model on keylogger dataset by evaluating a selection of attributes. Besides, to test the accuracy of detection models on keylogger dataset comparing two machine learning algorithms. …”
    Get full text
    Get full text
    Student Project
  10. 10

    The comparative study of model-based and appearance based gait recognition for leave bag behind by Zainol, Norfazilah

    Published 2018
    “…In this research, the analysis performed using two methods which are Model-Based approaches and Appearance-Based approaches. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Frontal View Gait Recognition With Fusion of Depth Features From a Time of Flight Camera by Tengku Mohd Afendi, Zulcaffle, Fatih, Kurugollu, Crookes, Danny, Ahmed, Bouridane, Mohsen, Farid

    Published 2019
    “…The data set includes two sessions recorded seven months apart, with 46 and 33 subjects, respectively, each with six walks with five covariates. The four-part method includes: a new human silhouette extraction algorithm that reduces the multiple reflection problem experienced by ToF cameras; a frame selection method based on a new gait cycle detection algorithm; four new gait image representations; and a novel fusion classifier. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    The comparative study of model-based and appearance Based gait recognition for leave bag behind by Zainol, Norfazilah

    Published 2018
    “…In this research, the analysis perfonned using two methods which are Model-Based approaches and Appearance-Based approaches. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Energy, Vibration And Sound Research Group (e-VIBS) School Of Science And Technology Universiti Malaysia Sabah : Bioacoustics Signal Modeling Using Time-Frequency Distribution by Jedol Dayou, Ng, Chee Han, Ho, Chong Mun, Abdul Hamid Ahmad, Mohd Noh Dalimin, Sithi V. Muniandy

    Published 2011
    “…In conclusion, this work has successfully developed the species identification system based on bioacoustics signals by using the concept of WE. By comparing to the reference methods (conventional or classical methods), this study has proven that the performance of the bioacoustics species identification system can be improved by using the entropy approach with association of WT. …”
    Get full text
    Get full text
    Get full text
    Research Report
  15. 15

    Multi-stage feature selection in identifying potential biomarkers for cancer classification by Wong, Yit Khee, Chan, Weng Howe, Nies, Hui Wen, Moorthy, Kohbalan

    Published 2022
    “…Therefore, this study aims to investigate and develop a better feature selection to identify potential biomarkers from gene expression data and construct a deep neural network classification model using these selected features. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…This research was undertaken to develop methods to mitigate shoulder-surfing attack. Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Three-dimensional craniometrics identification model and cephalic index classification of Malaysian sub-adults: A multi-slice computed tomography study / Sharifah Nabilah Syed Mohd... by Sharifah Nabilah , Syed Mohd Hamdan

    Published 2024
    “…Discriminant function analysis (DFA), binary logistic regression (BLR), and several machine learning (ML) algorithms (random forest (RF), support vector machines (SVM), and linear discriminant analysis (LDA)) were used to statistically analyse the data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Register Transfer Level Implementation Of Pooling - Based Feature Extraction For Finger Vein Identification by Mohamed Ali, Mohamed Hassan

    Published 2017
    “…The proposed algorithm extracted the local feature information of the finger vein pattern (patches), and used these patches to improve the robustness of the identification. …”
    Get full text
    Get full text
    Thesis