Search Results - (( data collection methods algorithm ) OR ( data normalization based algorithm ))

Refine Results
  1. 1

    The normalized random map of gradient for generating multifocus image fusion by Ismail, ., Kamarul Hawari, Ghazali

    Published 2020
    “…It successes to eliminate the mathematical and algorithm problems. Furthermore, the evaluation of proposed method based on the fused image quality. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Confidence intervals (CI) for concentration parameter in von Mises distribution and analysis of missing values for circular data / Siti Fatimah binti Hassan by Hassan, Siti Fatimah

    Published 2015
    “…In this study, three imputation methods are considered namely expectation-maximization (EM) algorithm and data augmentation (DA) algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff by Mohd Yusoff, Mohd Izhan

    Published 2014
    “…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Prediction of Total Suspended Sediments in Penang Waters Using Remote Sensing by Tan, Sek Aun

    Published 2004
    “…Out of the six algorithms derived, Algorithm 6 showed the best correlation with the ground-truth data (R2 value of 0.9755 and RMSE value of 4.0107). …”
    Get full text
    Get full text
    Thesis
  6. 6

    Robust remote heart rate estimation from multiple asynchronous noisy channels using autoregressive model with Kalman filter by Nooralishahi, Parham, Loo, Chu Kiong, Shiung, Liew Wei

    Published 2019
    “…In this paper, we explore the potential of our algorithm on two self-collected, and DEAP databases. …”
    Get full text
    Get full text
    Article
  7. 7

    Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah by Abdullah, Mohd Azrul

    Published 2015
    “…Two important Weibull parameters which are shape and scale are measured. Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. …”
    Get full text
    Get full text
    Article
  8. 8

    Forensic language of property theft genre based on mathematical formulae and machine learning algorithms / Hana' Abd Razak by Abd Razak, Hana'

    Published 2020
    “…Four traits was discovered namely spine, pelvis, knee and ankle. Next, data collection of normal and anomalous behaviour is collected using Kinect sensor. …”
    Get full text
    Get full text
    Thesis
  9. 9

    The development of extra axial brain tumor detection prototype using back propagation based neural network / Suriyanti Panagen by Panagen, Suriyanti

    Published 2006
    “…About 46 patients' data was collected from the Radiographic Department in that Hospital. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah by Abdullah, Mohd Azrul

    Published 2015
    “…Two important Weibull parameters which are shape and scale are measured. Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Blotch removal using multi-level scanning, shape analysis, and meta heuristic techniques by Khammar, Mohammad Reza

    Published 2015
    “…In order to remove blotches from digitized old archives, two steps are necessary:detection of the position of blotches and restoration of the missing data. Regarding the detection, a post processing method based on a combination of pixel-based and objects-based methods was proposed. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Fault detection and diagnosis using correlation coefficients by Mak, Weng Yee

    Published 2005
    “…This research is to formulate a FDD algorithm based on MSPC via correlation coefficients. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Sauvola Segmentation and Support Vector Machine-Salp Swarm Algorithm Approach for Identifying Nutrient Deficiencies in Citrus Reticulata Leaves by Lia, Kamelia

    Published 2024
    “…The proposed method integrates colour and texture feature-based image analysis with machine learning algorithms for classification. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Handgrip strength evaluation using neuro fuzzy approach by Seng, W.C., Chitsaz, M.

    Published 2010
    “…The purpose of this study is to collect handgrip strength of patients and distinguish them from the normal persons. …”
    Get full text
    Get full text
    Article
  16. 16

    Automated cone cut error detection of bitewing images using convolutional neural network by Mohamed Misbahou Mkouboi, Mohamed Moubarak, Olowolayemo, Akeem, Ghazali, Ahmad Badruddin

    Published 2023
    “…Meanwhile, deep learning is a specialized artificial intelligence method where an algorithm can be trained to automatically detect, classify and give output based on the trained dataset. …”
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    Clustering autism spectrum disorder student’s system based on intelligence, skills and behavior using agglomerative clustering algortihm / Daarin Nadia Nordin by Nordin, Daarin Nadia

    Published 2020
    “…Data cleaning and data transformation is first carried out, followed by normalization through the Z-score method before being processed in the clustering model. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Sleep as a predictor of depression level using Naïve Bayes / Nur Syakinah Md Roduan by Md Roduan, Nur Syakinah

    Published 2017
    “…Future work on this subject should improve the findings by modifying the variables used and/or by using other methods in term of data collection or the algorithm itself.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Modelling of intelligent intrusion detection system: making a case for snort by Olanrewaju, Rashidah Funke, Ku zahir, Ku Nor Afiza, Asnawi, Ani Liza, Sanni, Mistura Laide, Ahmed, Abdulkadir Adekunle

    Published 2018
    “…The data collected was used to train the Multilayer Feedforward Neural Network (MLFNN) with Back-propagation (BP) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    Software reusability in green computing / Ibraheem Y. Y. Ahmaro by Y. Y. Ahmaro, Ibraheem

    Published 2013
    “…Reliability analysis, factor analysis, normality analysis, correlation analysis and regression analysis are used to analyze the amassed data. …”
    Get full text
    Get full text
    Thesis