Search Results - (( a constructive method algorithm ) OR ( _ normalization based algorithm ))

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…In order to make the normal people can cluster their data easily, this project aims is to develop a web-based clustering tool that can be used by all peoples. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring by Ab Halim, Haizum Hanim

    Published 2021
    “…In a conclusion, SEM prototype and adaptive communication data transfer algorithm with a combination of the three communication will be another method to solve a single communication problem of SM and suitable in residential location that offered the proposed communication infrastructure.…”
    Get full text
    Get full text
    Thesis
  3. 3

    Confidence intervals (CI) for concentration parameter in von Mises distribution and analysis of missing values for circular data / Siti Fatimah binti Hassan by Hassan, Siti Fatimah

    Published 2015
    “…By ignoring the existence of missing values, leads to the biasness and lack of efficiency of a statistics. In this study, three imputation methods are considered namely expectation-maximization (EM) algorithm and data augmentation (DA) algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    PSO and Linear LS for parameter estimation of NARMAX/NARMA/NARX models for non-linear data / Siti Muniroh Abdullah by Abdullah, Siti Muniroh

    Published 2017
    “…PSO is a swarm-based search algorithm perform a stochastic search to explore the search space. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation by Chen, Qipeng, Xiong, Qiaoqiao, Huang, Haisong, Tang, Saihong, Liu, Zhenghong

    Published 2024
    “…In response to the current issues of poor real-time performance, high computational costs, and excessive memory usage of object detection algorithms based on deep convolutional neural networks in embedded devices, a method for improving deep convolutional neural networks based on model compression and knowledge distillation is proposed. …”
    Get full text
    Get full text
    Article
  6. 6

    Reliability assessment of power system generation adequacy with wind power using population-based intelligent search methods by Kadhem, Athraa Ali

    Published 2017
    “…The reliability assessment of the adequacy of the generating system is normally calculated by using either analytical or simulation methods. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Fault Detection and Identification in Quadrotor System (Quadrotor Robot) by Chan, Shi Jing, Pebrianti, Dwi

    Published 2016
    “…The aim of the research is to construct and design a Fault Detection and Isolation algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Recursive construction of output-context fuzzy systems for the condition monitoring of electrical hotspots based on infrared thermography by Ahmed, M.M., Huda, A.S.N., Isa, N.A.M.

    Published 2015
    “…The proposed RCFS realizes the prominent distinctions in the output domain by using a self-organizing method. The termination of the recursive algorithm finds an effective rule base to achieve an accurate representation of the datasets. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Scheduling dynamic cellular manufacturing systems in the presence of cost uncertainty using heuristic method by Delgoshaei, Aidin

    Published 2016
    “…Since the proposed models (like similar models in the literature) are likely to fall into local optimum points, a Branch and Bound based heuristic, a hybrid Simulated Annealing and Genetic algorithm, a hybrid Tabu search and Simulated Annealing, a hybrid Genetic algorithm and Simulated Annealing, a hybrid Ant Colony Optimization and Simulated Annealing and a hybrid Multi-layer Perceptron and Simulated Annealing algorithms are developed. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Innovation of marketing supply chain management model based on SICAS modeling by Mao, Rui, Liu, Youwei, Yang, Yida

    Published 2024
    “…A collaborative optimization model of the supply chain based on virtual inventory management is constructed to ensure the normal operation of the whole supply chain by deploying flexible inventory in the hands of customers, and the constructed model is solved by using an evolutionary algorithm based on indexes and an optimal solution sorting method based on regret theory. …”
    Get full text
    Get full text
    Article
  11. 11

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…Subsequently, NB+RF, a hybrid classification algorithm is used to distinguish similar and dissimilar content behaviours of a packet. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Machine condition monitoring and fault diagnosis using spectral analysis techniques by Salami, Momoh Jimoh Eyiomika, Abdul Muthalif, Asan Gani, Pervez, T.

    Published 2001
    “…Results of analysis clearly indicate that this method of analysis can be further developed and used for self-diagnosis, predictive maintenance and intelligent-based monitoring.…”
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    Mean of correlation method for optimization of affective states detection in children by Rusli, Nazreen, Sidek, Shahrul Na'im, Md Yusuf, Hazlina, Ishak, Nor Izzati

    Published 2018
    “…This paper proposes an effective algorithm of texture analysis based on novel technique using Gray Level Co-occurrence Matrix approach to be applied so as to identify blood-flow region. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Verification of volume-of-fluid (VOF) simulation for thin liquid film applications by Balachandran S., Shuaib N.H., Hasini H., Yusoff M.Z.

    Published 2023
    “…For this purpose, various cases of a thin liquid film flowing into rectangular cavities were simulated and the resulting surface profiles analyzed in terms of the normal velocity of the constructed surface, which should be zero in a real surface. …”
    Conference paper
  15. 15

    Machine Learning based Predictive Modelling of Cybersecurity Threats Utilising Behavioural Data by Ting, Tin Tin, Khiew, Jie Xin, Ali Aitizaz, Lee, Kuok Tiung, Teoh, Chong Keat, Hasan Sarwar

    Published 2023
    “…The algorithms are used to construct, test, and validate three categories of cybercrime threat (Malware, Social Engineering, and Password Attack) predictive models. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Delamination in fiberglass pre-impregnated laminated composites from ultrasonic a-scan signal using artificial intelligence by Mahmod, Muhammad Faisal

    Published 2018
    “…This technique is not suitable as the damage caused by the impact normally occurred by accident at random location. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Fuzzy-pid controller design for brake-by-wire system of electrical vehicle by Sider, Ameer M. F.

    Published 2014
    “…Above and beyond, BBW operating process is improved by developing new integrated control strategy that involves both designed brakes (hard and normal) in one sole framework. Constructing such a system is primarily based on conventional IFELSE conditional control. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Reservoir Inflow Forecasting Using Artificial Neural Network and Adaptive Neuro-Fuzzy Inference System Techniques by Googhari, Shahram Karimi

    Published 2007
    “…The model was trained based on the Leven-berg Marquardt algorithm with sigmoid activation functions. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Enhancement of compound word extraction in Malay sentences using modified linguistics approaches / Zamri Abu Bakar by Abu Bakar, Zamri

    Published 2023
    “…To achieve the objective, this research explores a linguistic method for extracting compound word from standard Malay corpus. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A novel normal parameter reduction algorithm of soft sets by Ma, Xiuqin, Norrozila, Sulaiman, Qin, Hongwu, Herawan, Tutut

    Published 2010
    “…In this paper, we propose a novel normal parameter reduction algorithm of soft sets based on the oriented-parameter sum, which can be carried out without parameter important degree and decision partition. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item