Search Results - (( based generation method algorithm ) OR ( data normalization based algorithm ))
Search alternatives:
- normalization based »
- data normalization »
- generation method »
- based generation »
- method algorithm »
-
1
The normalized random map of gradient for generating multifocus image fusion
Published 2020“…It successes to eliminate the mathematical and algorithm problems. Furthermore, the evaluation of proposed method based on the fused image quality. …”
Get full text
Get full text
Get full text
Article -
2
A new variant of black hole algorithm based on multi population and levy flight for clustering problem
Published 2020“…The first modification is the integration of BH algorithm and levy flight, which result in data clustering method, namely “Levy Flight Black Hole (LBH)”. …”
Get full text
Get full text
Thesis -
3
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…The Real-Valued Negative Selection Algorithms, which are the focal point of this research, generate their detector sets based on the points of self data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Optimization and control of hydro generation scheduling using hybrid firefly algorithm and particle swarm optimization techniques
Published 2018“…To deal with these problems, this thesis introduces three approved intelligent controllers for hydropower generation. Firstly, a hybrid algorithm namely firefly particle swarm optimization (FPSO) and series division method (SDM) based on the practical swarm optimization and the firefly algorithm is proposed. …”
Get full text
Get full text
Thesis -
5
Monitoring the impacts of drought on land use/cover: a developed object-based algorithm for NOAA AVHRR time series data
Published 2011“…As a novel idea in this study, it developed a new object-based classification algorithm for AVHRR (Advanced Very High Resolution Radiometer) data. …”
Get full text
Get full text
Get full text
Article -
6
Prediction of Total Suspended Sediments in Penang Waters Using Remote Sensing
Published 2004“…Out of the six algorithms derived, Algorithm 6 showed the best correlation with the ground-truth data (R2 value of 0.9755 and RMSE value of 4.0107). …”
Get full text
Get full text
Thesis -
7
The new efficient and accurate attribute-oriented clustering algorithms for categorical data
Published 2012“…Four real-life data sets obtained from University of California Irvine (UCI) machine learning repository and ten synthetically generated data sets are used to evaluate MGR and IG-ANMI algorithms, and other four algorithms are used to compare with these two algorithms. …”
Get full text
Get full text
Thesis -
8
Reliability assessment of power system generation adequacy with wind power using population-based intelligent search methods
Published 2017“…The reliability assessment of the adequacy of the generating system is normally calculated by using either analytical or simulation methods. …”
Get full text
Get full text
Get full text
Thesis -
9
Forensic language of property theft genre based on mathematical formulae and machine learning algorithms / Hana' Abd Razak
Published 2020“…Towards achieving better detection in real-time environment, colour pixel-based images were trained on five pre-trained CNNs using transfer learning algorithm. …”
Get full text
Get full text
Thesis -
10
Fault Detection and Identification in Quadrotor System (Quadrotor Robot)
Published 2016“…The ANN is designed based on the back-propagation technique so that it can be trained to generate output based on the data. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
Published 2014“…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
Get full text
Get full text
Get full text
Thesis -
12
Agent-based extraction algorithm for computational problem solving
Published 2015“…Four agents have been proposed as an agent based model for CPS, which are User_Agent, PAC_Agent, IPO_Agent and Algorithm_Agent. …”
Get full text
Get full text
Thesis -
13
A Method for Mapping XML DTD to Relational Schemas In The Presence Of Functional Dependencies
Published 2008“…This concept is used to specify the constraints that may exist in the relations and guide the design while removing semantic data redundancies. This approach leads to a good normalized relational schema without data redundancy. …”
Get full text
Get full text
Thesis -
14
-
15
Fault detection and diagnosis using correlation coefficients
Published 2005“…This research is to formulate a FDD algorithm based on MSPC via correlation coefficients. …”
Get full text
Get full text
Thesis -
16
Dynamic traffic light flow control system using on-road sensor technology / Mohamed Irfan
Published 2017“…In this research, a system is proposed that utilizes and manages traffic light controllers; more specifically an algorithm is presented which dynamically changes the traffic control system based on the vehicular flow data generated by on-road sensor technology. …”
Get full text
Get full text
Get full text
Thesis -
17
Out-of-core simplification with appearance preservation for computer game applications
Published 2006“…During run-time, the visible mesh is rendered based on the distance criterion by extracting the required data from the previously generated octree structure. …”
Get full text
Get full text
Thesis -
18
A new hybrid multiaxial fatigue life model based on critical plane continuum damage mechanics and genetic algorithm
Published 2015“…The notion of characteristic profiles for the calibration of the model is also coherent with the application of equivalent fatigue loading in generating experimental data for calibration. The model is simple in application with the use of genetic algorithm for model calibration making use of only the material fatigue limit. …”
Get full text
Get full text
Thesis -
19
Out-of-core simplification with appearance preservation for computer game applications
Published 2006“…During run-time, the visible mesh is rendered based on the distance criterion by extracting the required data from the previously generated octree structure. …”
Get full text
Get full text
Monograph -
20
The development of level of detail (LOD) technique in 3D computer graphics application
Published 2009“…During run-time, the visible mesh is rendered based on the distance criterion by extracting the required data from the previously generated octree structure. …”
Get full text
Get full text
Monograph
