Search Results - (( data equalization based algorithm ) OR ( data normalization _ algorithm ))
Search alternatives:
-
1
Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems
Published 2013“…The detectors: zero forcing block linear equalizer and minimum mean square error block linear equalizer algorithms are considered in this paper to recover the data. …”
Get full text
Get full text
Article -
2
Reduced Rank Technique for Joint Channel Estimation and Joint Data Detection in TD-SCDMA Systems
Published 2012“…The detectors: zero forcing block linear equalizer and minimum mean square error block linear equalizer algorithms are considered in this paper to recover the data. …”
Get full text
Get full text
Article -
3
Reduced-rank technique for joint channel estimation in TD-SCDMA systems.
Published 2013“…The detectors: zero forcing block linear equalizer and minimum mean square error block linear equalizer algorithms are considered in this paper to recover the data. …”
Get full text
Get full text
Article -
4
An enhancement of classification technique based on rough set theory for intrusion detection system application
Published 2019“…Thus, to deal with huge dataset, data mining technique can be improved by introducing discretization algorithm to increase classification performance. …”
Get full text
Get full text
Thesis -
5
Widely linear dynamic quaternion valued least mean square algorithm for linear filtering
Published 2017“…The proposed algorithm is capable of processing the generality of quaternion and complex data signals in both noisy and noise-free environments. …”
Get full text
Get full text
Get full text
Thesis -
6
Improved Genetic Algorithm Multilayer Perceptron Network For Data Classification
Published 2017“…Ketiganya, tiga jenis variasi elitism dinamakan sebagai Best Among Normal and Improved Population (BANI), Best Between Similar Rank (BBSR) dan Equally Contributed (EQ) telah dibangunkan. …”
Get full text
Get full text
Thesis -
7
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Published 2021“…The proposed multi-trust approach is used to analyze the credibility of sensitive monitored data. A novel and efficient cluster head selection algorithm (ECHSA) is employed to improve the performance of the cluster head (CH) selection process in clustered WSN. …”
Get full text
Get full text
Article -
8
Technical report: genetic algorithm for vehicle routing problem / Mohammad Izwan Jamaluddin and Muhamad Syahmie Adeeb Mohd Shukri
Published 2016“…Based on the study that have been conducted the minimum routes is equal to 3990. …”
Get full text
Get full text
Student Project -
9
The development of Muscle Fatigue Prediction model from muscle torque and contraction data / Keshasni Earichappan
Published 2023“…This study aims to develop a prediction model to predict muscle fatigue levels (100%-75%, 75%-50%, 50%-25%, 25%-0%) from muscle contraction and torque using Levenberg Marquardt algorithm. This study starts with the collection of data on muscle contraction(mV) and torque (Nm) based on six healthy subjects doing isokinetic knee extension. …”
Get full text
Get full text
Get full text
Thesis -
10
Enhanced emotion recognition in videos: a convolutional neural network strategy for human facial expression detection and classification
Published 2023“…Despite extensive research employing machine learning algorithms like convolutional neural networks (CNN), challenges remain concerning input data processing, emotion classification scope, data size, optimal CNN configurations, and performance evaluation. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Application of Bat Algorithm and Its Modified Form Trained with ANN in Channel Equalization
Published 2022“…An alternative approach to training neural network-based equalizers is to use metaheuristic algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
12
Non-invasive diagnosis of risk in dengue patients using bioelectrical impedance analysis and artificial neural network
Published 2010“…The dengue risk severity criteria was determined and grouped based on three blood investigations, namely, platelet (PLT) count (less than or equal to 30,000 cells per mm 3), hematocrit (HCT) (increase by more than or equal to 20), and either aspartate aminotransferase (AST) level (raised by fivefold the normal upper limit) or alanine aminotransferase (ALT) level (raised by fivefold the normal upper limit). …”
Get full text
Get full text
Get full text
Article -
13
Improved power output forecastingtechnique for effective battery management in photovoltaic system / Utpal Kumar Das
Published 2019“…A PSO-based algorithm is adopted for the appropriate selection of dominated parameters of SVR-based model to achieve better performance. …”
Get full text
Get full text
Get full text
Thesis -
14
Design of a Fuzzy Logic Controller for Skid Steer Mobile Robot
Published 2009“…To facilitate the implementation of control system, real-time execution is done in an indoor environment. Data acquisition is done in a LABVIEW and a MATLAB control algorithm is called in LABVIEW. …”
Get full text
Get full text
Thesis -
15
Segmentation of MRI brain images using statistical approaches
Published 2011“…Therefore, these algorithms can be improved upon. A neighbourhood-based noise-reduction algorithm which uses the edges of an image is proposed. …”
Get full text
Get full text
Thesis -
16
Enhanced handover decision algorithm in heterogeneous wireless network
Published 2017“…It also employs three types of vertical handover decision algorithms: equal priority, mobile priority and network priority. …”
Get full text
Get full text
Get full text
Article -
17
A comparison of watermarking image quality based on dual intermediate significant bit with genetic algorithm
Published 2013“…In this case, when the two hidden bits are equal to the original bits, there will be no change to the other remaining bits.However, if the original value is not equal to the embedded one, the nearest pixel to the original one will be chosen as the watermarked image.The second method, GA method is used to embed two bits of watermarking data within every pixel of the original image and to find the optimal value based on the existing DISB.On the other hand, if the two embedded bits are equal to the original bits then this means the watermarked image is still the same as the original one without any changes, while in the other case GA is used in determining the minimum fitness value in which the fittest is the absolute value between the pixel and chromosome and the value of chromosome between 0-255.The results indicate that the two methods produce a high quality watermarked image, but there is a big difference in the processing time, so the DISB method is faster than the GA method.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Adjusted 0-1 knapsack problem in cargo flow by using artificial bee colony algorithm / Nor Zuliiziati Md Jani
Published 2021“…With its total value as much as possible, the number of items that may become less or at least equal to or equal to the limit. The aim of this research is to determine the flow of the shipment based on volume and to determine the total cost based on the flow of shipment by using Artificial Bee Colony (ABC) algorithm. …”
Get full text
Get full text
Student Project -
19
Effect of normalization and effect of normalization and training algorithm on radial basis training algorithm on radial basis function network performance function network performa...
Published 2007“…To recognize the effect of normalization of data and training algorithm on Radial Basis Function (RBF) performance.…”
Get full text
Get full text
Conference or Workshop Item -
20
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…The best accuracy result of 99.97% is obtained when the model operates in a hybrid mode based on a combination of PCA, LDA and RF algorithms, and the data reduction parameter equals 40.…”
Get full text
Get full text
Get full text
Article
