Search Results - (( data collection methods algorithm ) OR ( parameter evaluation method algorithm ))
Search alternatives:
- parameter evaluation »
- collection methods »
- methods algorithm »
- method algorithm »
-
1
Delay and energy-aware routing for efficient data collection in wireless sensor networks / Ihsan Ali
Published 2024“…To address relay node selection and data scheduling issues, Energy-Efficient Scheduling (EES) and Energy-Efficient Un-Scheduling (EEUS) methods have been introduced using the Improved Discrete Bat Algorithm (IDBA) along with the Adaptive Warshal Floyd algorithm (AWF). …”
Get full text
Get full text
Get full text
Thesis -
2
Comparison of Logistic Regression, Random Forest, SVM, KNN Algorithm for Water Quality Classification Based on Contaminant Parameters
Published 2024“…The methodology used includes data collection, preprocessing, and algorithm implementation with evaluation using crossvalidation techniques. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Confidence intervals (CI) for concentration parameter in von Mises distribution and analysis of missing values for circular data / Siti Fatimah binti Hassan
Published 2015“…In this study, three imputation methods are considered namely expectation-maximization (EM) algorithm and data augmentation (DA) algorithm. …”
Get full text
Get full text
Thesis -
4
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
5
Hybrid Artificial Bees Colony algorithms for optimizing carbon nanotubes characteristics
Published 2018“…Chemical Vapor Deposition (CVD) is the most efficient method for CNTs production.However,using CVD method encounters crucial issues such as customization,time and cost.Therefore,Response Surface Methodology (RSM) is proposed for modeling and the ABC-βHC is proposed for optimization purpose to address such issues.The selected CNTs characteristics are CNTs yield and quality represented by the ratio of the relative intensity of the D and G-bands (ID/IG).Six case studies are generated from collected dataset including four cases of CNTs yield and one case of ID/IG as single objective optimization problems,while the sixth case represents multi-objective problem.The input parameters of each case are a subset from the set of input parameters including reaction temperature,duration,carbon dioxide flow rate,methane partial pressure,catalyst loading,polymer weight and catalyst weight.The models for the first three case studies were mentioned in the original work.RSM is proposed to develop polynomial models for the output responses in the other three cases and to identi significant process parameters and interactions that could affect the CNTs output responses.The developed models are validated using t-test,correlation and pattern matching.The predictive results have a good agreement with the actual experimental data.The models are used as objective functions in optimization techniques.For multi-objective optimization,this study proposes Desirability Function Approach (DFA) to be integrated with other proposed algorithms to form hybrid techniques namely RSM-DFA,ABC-DFA and ABC-βHC-DFA.The proposed algorithms and other selected well-known algorithms are evaluated and compared on their CNTs yield and quality.The optimization results reveal that ABC-βHC and ABC-βHC-DFA obtained significant results in terms of success rate,required time,iterations,and function evaluations number compared to other well-known algorithms.Significantly,the optimization results from this study are better than the results from the original work of the collected dataset.…”
Get full text
Get full text
Get full text
Thesis -
6
The normalized random map of gradient for generating multifocus image fusion
Published 2020“…It successes to eliminate the mathematical and algorithm problems. Furthermore, the evaluation of proposed method based on the fused image quality. …”
Get full text
Get full text
Get full text
Article -
7
Offline handwritten character recognition using backpropagation neural network / Masnizah Mohadi
Published 2005“…From this process, 13 data collected are used for training and 6 more are used to train the network in order to evaluate the network's performance. …”
Get full text
Get full text
Thesis -
8
Classification of breast cancer disease using bagging fuzzy-id3 algorithm based on fuzzydbd
Published 2022“…For the proposed technique of the FID3-DBD algorithm, the continuous and discrete (integer) attributes would be defined in the linguistic values of the fuzzy sets, and the FUZZYDBD method is being used to set up the fuzzy sets’ parameters. …”
Get full text
Get full text
Thesis -
9
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Two important Weibull parameters which are shape and scale are measured. Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. …”
Get full text
Get full text
Article -
10
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Two important Weibull parameters which are shape and scale are measured. Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. …”
Get full text
Get full text
Thesis -
11
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…One of the approaches for structural health monitoring (SHM) consists of two major components, i.e. a network of sensors to collect the response data and an extraction method to obtain information on the structural health condition. …”
Get full text
Get full text
Get full text
Thesis -
12
Development of wwm system using mlnn-ga for ph prediction of water quality in catchment area
Published 2021“…Data samples need to be collected and evaluated in the laboratory. …”
Get full text
Get full text
Thesis -
13
Photogrammetric low-cost unmanned aerial vehicle for pothole detection mapping / Shahrul Nizan Abd Mukti
Published 2022“…For volume estimation purpose, a Digital Elevation Models (DEM) were generated from photogrammetric method with flight parameters of three (3) different camera focal length and ten (10) UAV altitude. …”
Get full text
Get full text
Thesis -
14
UAV-based PM₂.₅ monitoring system for small scale urban areas
Published 2018“…Observations based on UAV-based PM2.5 monitoring sensors were applied around 1.6 km² area for collecting data at low altitude. Meteorological parameters including temperature and humidity were collected. …”
Get full text
Get full text
Thesis -
15
Adaptive template matching of photoplethysmogram pulses to detect motion artefact
Published 2018“…The performance of our algorithm was evaluated using data obtained from two different sources: (i) our own data collected from 19 healthy subjects using the wearable Sotera Visi Mobile system (Sotera Wireless Inc.) as they performed various movement types; and (ii) ICU data provided by the PhysioNet MIMIC II database. …”
Get full text
Get full text
Article -
16
Power prediction using the wind turbine power curve and data-driven approaches / Ehsan Taslimi Renani
Published 2018“…To evaluate the performance of the Weibull parameters’ estimator methods, two sets of data are considered, one based on simulated data with different random variable size and the other based on actual data collected from a wind farm in Iran. …”
Get full text
Get full text
Get full text
Thesis -
17
Handgrip strength evaluation using neuro fuzzy approach
Published 2010“…The purpose of this study is to collect handgrip strength of patients and distinguish them from the normal persons. …”
Get full text
Get full text
Article -
18
TDMA scheduling analysis of energy consumption for iot wireless sensor network
Published 2019“…The major objective for this project is to re-implement the proposed Energy Topology DRAND (E-T-DRAND) algorithm in IoT WSN using time slot allocation method and allocate nodes together with the node energy information and compare the obtained results with the corresponding results in the base paper. …”
Get full text
Get full text
Thesis -
19
-
20
Modelling of intelligent intrusion detection system: making a case for snort
Published 2018“…The data collected was used to train the Multilayer Feedforward Neural Network (MLFNN) with Back-propagation (BP) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
