Search Results - (( based relation between algorithm ) OR ( _ identification based algorithm ))*

Refine Results
  1. 1

    Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification by Abd Samad, Md Fahmi

    Published 2011
    “…System identification is a method of determining a mathematical relation between variables and terms of a process based on observed input-output data. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan by Muhammad @ Atan, Nurmalessa

    Published 2020
    “…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Identification of continuous-time hammerstein model using improved archimedes optimization algorithm by Islam, Muhammad Shafiqul, Mohd Ashraf, Ahmad, Cho, Bo Wen

    Published 2024
    “…Therefore, this article identified various continuous-time Hammerstein models based on an improved Archimedes optimization algorithm (IAOA) to address these concerns. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Deep learning-based colorectal cancer classification using augmented and normalised gut microbiome data / Mwenge Mulenga by Mwenge , Mulenga

    Published 2022
    “…First, to investigate the methods used to address limitations associated with microbiome-based datasets in colorectal cancer identification using deep neural network algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar by Seyed Alireza, Ravanfar

    Published 2017
    “…The location of the crack is identified by defining the damage index called relative wavelet packet entropy (RWPE). Then, the damage severities at the identified locations are assessed using genetic algorithm (GA), through defining a database to reveal the relationships between the energies obtained and damage severities. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Improving explicit aspects extraction in sentiment analysis using optimized ruleset / Mohammad Ahmad Jomah Tubishat by Mohammad Ahmad, Jomah Tubishat

    Published 2019
    “…In addition, extraction rules including either pattern-based or dependency-based rules should be selected in a correct way to remove the irrelevant rules and minimize the extraction errors Thus, in this study, to select the most effective extraction rules, an improved version of Whale Optimization Algorithm (IWOA) is developed and applied to a full set of rules. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Scalability and performance in duplicate detection : relational vs. graph database by Muhammad Farhad, Khaharruddin

    Published 2023
    “…As a result, they may not be effective in identifying and resolving duplicate data in certain use cases. Graph-based algorithms such as community detection, may prove beneficial as it can capture a more complex relationships between data. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8

    Tracking of moving athlete from video sequences using fower pollination algorithm by Ong, Pauline, Chong, Tang Keat, Ong, Kok Meng, Low, Ee Soong

    Published 2022
    “…Performance analysis, as related to sport, is a process underpinned by a systematic analysis of information, to accelerate the performance of athletes through crafted focused practice session based on the obtained analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Adaptive model predictive control based on wavelet network and online sequential extreme learning machine for nonlinear systems by Salih, Dhiadeen Mohammed

    Published 2015
    “…An analytical analysis based on ELM theories presented to prove the capability of the LWN to support the OSELM algorithm (LWN-OSELM). …”
    Get full text
    Get full text
    Thesis
  10. 10

    Efficient document retrieval system using locality sensitive hashing nearest neighbor algorithm and weighted jaccard distance for retrieving closest personalities by SE. Ben Georgea, G. Jeba Rosline, N. Balasupramanian, N.R. Wilfred Blessing

    Published 2024
    “…The process of retrieving significant documents based on the search key from a corpus has been a vital research problem in the information retrieval field. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Identification of material properties of composite plates using Fourier-generated frequency response functions by Tam, Jun Hui, Ong, Zhi Chao, Lau, Chun Lek, Ismail, Zubaidah, Ang, Bee Chin, Khoo, Shin Yee

    Published 2019
    “…The present research adopts the use of Fourier-based plate model to synthesize FRFs for its proven prominent accuracy and incorporates with a hybrid optimization algorithm. …”
    Get full text
    Get full text
    Article
  12. 12

    Risk assessment for safety and health algorithm for building construction in Oman by Al-Anbari, Saud Said

    Published 2015
    “…Risk assessment matrices are widely used to evaluate risks related to such hazards. Existing risk matrices are designed based on brainstorming sessions, which may make these matrices risky to use because such sessions are based mainly on experience and knowledge about the decision at hand. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A Genetic-CBR Approach for Cross-Document Relationship Identification by Jaya Kumar, Yogan

    Published 2012
    “…Information across topically related documents can often be linked. Cross-document Structure Theory (CST) analyzes the relationships that exist between sentences across related documents. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  14. 14

    Light weight deep learning algorithm for voice call quality of services (Qos) in cellular communication by Ramalingam, Mritha, Sultanuddin, S. J., Nithya, N., Raj, T. F. Michael, Kumar, T. Rajesh, Prasad, S. J. Suji, Al-Ammar, Essam A., Siddique, M. H., Udayakumar, Sridhar

    Published 2022
    “…This proposed model was consecutively monitoring the voice data packets and ensuring the proper message between the transmitter and receiver. The phone sends its unique identification code to the station. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Integration of machine learning and remote sensing for above ground biomass estimation through Landsat-9 and field data in temperate forests of the Himalayan region by Anees, Shoaib Ahmad, Mehmood, Kaleem, Khan, Waseem Razzaq, Sajjad, Muhammad, Alahmadi, Tahani Awad, Alharbi, Sulaiman Ali, Luo, Mi

    Published 2024
    “…Through the utilization of openly accessible fine-resolution data and employing the RF algorithm, the research demonstrated promising outcomes in the identification of optimal predictor-algorithm combinations for forest AGB mapping. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Artifact identification for blood pressure and photoplethysmography signals in an unsupervised environment / Lim Pooi Khoon by Lim , Pooi Khoon

    Published 2020
    “…For Blood Pressure signal, an automatic algorithm based on relative changes in the cuff pressure and neighbouring oscillometric pulses was proposed to remove outlier points caused by movement artifacts. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Hand, Foot and Mouth Disease (HFMD)'s Hotspot Identification using Bipartite Network Model by Nor Shamira, Sabri

    Published 2020
    “…The location nodes in the targeted and validated models were ranked using the web-based search algorithms according to the respective ranking values. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  18. 18
  19. 19

    Maass cusp form on asymmetric hyperbolic torus by Shamsuddin, Nor Syazana

    Published 2017
    “…The computation of MCF is an adapted algorithm of Hejhal and Then, i.e. based on implicit automorphy and finite Fourier series. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A biological inspired fuzzy adaptive window median filter (FAWMF) for enhancing DNA signal processing by Ahmad, M., Jung, L.T., Bhuiyan, A.-A.

    Published 2017
    “…The algorithm applied to variety of DNA datasets produced noteworthy discrimination between coding and non-coding regions contrary to fixed window length conventional filters. © 2017 Elsevier B.V.…”
    Get full text
    Get full text
    Article