Search Results - (( data estimation methods algorithm ) OR ( variable generation based algorithm ))

Refine Results
  1. 1

    Slight-Delay Shaped Variable Bit Rate (SD-SVBR) Technique for Video Transmission by Ahmad Suki, Che Mohamed Arif

    Published 2011
    “…It is designed based on the Shaped VBR (SVBR) algorithm and was implemented in the Network Simulator 2 (ns-2). …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Design of artificial intelligence based speed estimator for DC drives / Pauziah Saleh by Saleh, Pauziah

    Published 2006
    “…This thesis describes the design of Artificial Intelligence Based speed estimator for separately excited DC motor using feedforward backpropagation method. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A new hybrid multiaxial fatigue life model based on critical plane continuum damage mechanics and genetic algorithm by Masood, Kamal

    Published 2015
    “…The notion of characteristic profiles for the calibration of the model is also coherent with the application of equivalent fatigue loading in generating experimental data for calibration. The model is simple in application with the use of genetic algorithm for model calibration making use of only the material fatigue limit. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad by Ahmad, Khairul Adilah

    Published 2018
    “…This learning algorithm represents an automatic generation of membership functions and rules from the data. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Seismic wave modeling and high-resolution imaging by Bashir, Y., Ghosh, D.P., Alashloo, S.Y.M.

    Published 2022
    “…Dip frequency filtering (DFF) is a quick and reliable method for preserving diffraction. To suppress data reflection, this algorithm works in the frequency domain by defining a slope filter with respect to dt/dx. …”
    Get full text
    Get full text
    Book
  6. 6

    Determining malaria risk factors in Abuja, Nigeria using various statistical approaches by Segun, Oguntade Emmanuel

    Published 2018
    “…Therefore, this was not incorporated in BBN models. Based on cross-validation analysis, the score-based algorithm outperformed the constraint-based algorithms in the structural learning. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Modeling of cupping suction system based on system identification method by Kavindran, Suresh

    Published 2022
    “…Cupping suction plant identification utilizing a nonlinear model based on the modified Sine Cosine Algorithm (mSCA). …”
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8
  9. 9
  10. 10

    Improved robust estimator and clustering procedures for multivariate outliers detection by Sharifah Sakinah, Syed Abd Mutalib

    Published 2023
    “…Visual inspection is insufficient to detect outliers in multivariate data, unlike univariate data. One of the methods to detect outliers in multivariate data is by using distance-based methods, which is Mahalanobis distance (MD). …”
    Get full text
    Get full text
    Thesis
  11. 11

    High-Resolution Downscaling with Interpretable Relevant Vector Machine: Rainfall Prediction for Case Study in Selangor by Abdul Rashid, Raghdah Rasyidah, Shaharudin, Shazlyn Milleana, Sulaiman, Nurul Ainina Filza, Zainuddin, Nurul Hila, Mahdin, Hairulnizam, Mohd Najib, Summayah Aimi, Hidayat, Rahmat

    Published 2024
    “…The Principal Component Analysis (PCA) technique was employed to choose relevant environmental variables as input for the machine learning model, and various imputation methods were utilized to manage missing data, such as mean imputation and the KNN algorithm. …”
    Get full text
    Get full text
    Article
  12. 12

    Parametric and Semiparametric Competing Risks Models for Statistical Process Control with Reliability Analysis by Mohamed Elfaki, Faiz Ahmed

    Published 2004
    “…The Expectation Maximization (EM) algorithm is utilized to obtain the estimate of the parameters in the models. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Development of robust procedures for partial least square regression with application to near infrared spectral data by Silalahi, Divo Dharma

    Published 2021
    “…To fill-in the gap in the literature, a new robust procedure in wavelength selection based on input scaling method is developed using Filter-Wrapper method. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Semiparametric inference procedure for the accelarated failure time model with interval-censored data by Karimi, Mostafa

    Published 2019
    “…The rank-based methods, estimating algorithms, and resampling techniques that are developed do not involve the difficulties of the existing estimating procedures. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Multiple equations model selection algorithm with iterative estimation method by Kamarudin, Nur Azulia, Ismail, Suzilah

    Published 2016
    “…This estimation method is equivalent to maximum likelihood estimation at convergence. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Adapting the Elitism on the Greedy Algorithm for Variable Strength Combinatorial Test Cases Generation by Bahomaid, Ameen A., Alsewari, Abdulrahman A., Zamli, Kamal Z., Alsariera, Yazan A.

    Published 2018
    “…This study presented the most recent variable interaction strength (VS) CT strategy using an enhanced variant in the greedy algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Semiparametric estimation with profile algorithm for longitudinal binary data by Suliadi, Suliadi, Ibrahim, Noor Akma, Daud, Isa

    Published 2013
    “…We use profile algorithm in the estimation of both parametric and nonparametric components. …”
    Get full text
    Get full text
    Article
  19. 19

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
    Get full text
    Get full text
    Article
  20. 20