Search Results - (( data evaluation a algorithm ) OR ( variable detection using algorithm ))

Refine Results
  1. 1

    MotionSure: a cloud-based algorithm for detection of injected object in data in motion by Islam, Thouhedul, Olanrewaju, Rashidah Funke, Khalifa, Othman Omran

    Published 2017
    “…Total 1600 different type of files were used for evaluation of the proposed algorithm, results show that 87% of injected objects were correctly detected…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification by Abd Samad, Md Fahmi

    Published 2011
    “…Identification studies using NARX (Nonlinear AutoRegressive with eXogenous input) models employing simulated systems and real plant data are used to demonstrate that the algorithm is able to detect significant variables and terms faster and to select a simpler model structure than other well-known EC methods.…”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Enhancement of Space-Time Receiver Structure with Multiuser Detection for Wideband CDMA Communication Systems by Subramaniam, Jeevan Rao

    Published 2006
    “…The adaptive algorithms are evaluated as a function of the number of iterations it takes to converge and its transmission performance are compared. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Damage visualization based on frequency shift of single-mode ultrasound-guided wavefield by Shahrim, Muhamad Azim, Harmin, Mohammad Yazdi, Romli, Fairuz Izzuddin, Chia, Chen Ciang, Jung-Ryul, Lee

    Published 2022
    “…Overall, the results show that frequency analysis can detect the damage four times faster and the algorithm uses two-dimensional calculation instead of conventional three-dimensional of VTWAM method.…”
    Get full text
    Get full text
    Article
  6. 6

    Haar cascade algorithm for microsleep detection by Awang, Norkhushaini, Azhar, Ahmad Mirza

    Published 2025
    “…During the development phase, the system was built in Python using OpenCV and dlib for real-time facial analysis and the Haar Cascade algorithm for efficient facial feature detection. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Detection of leak size and its location in a water distribution system by using K-NN / Nasereddin Ibrahim Sherksi by Sherksi, Nasereddin Ibrahim

    Published 2020
    “…The successfully achieved four set objectives inclusive of (1) a new classification model to detect water leakage, (2) analysis of the effects of leakage size on the variables within a WDS, i.e. flow, pressure, pipe volume, velocity and water demand, (3) locating and specifying the leakage size in the WDS, and (4) evaluate the performance of the designed K-NN algorithm for accurate leak detection. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Development of a phantom and metal artifact correction (MAC) algorithm for post-operative spine computed tomography (CT) imaging / Noor Diyana Osman by Osman, Noor Diyana

    Published 2014
    “…The last part is the development of a metal artifact correction (MAC) algorithm and evaluation of the proposed algorithm in artifacts reduction in CT images. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Predicting Cheaters in PlayerUnknown’s Battlegrounds (PUBG) using Random Forest Algorithm by Nurin Alya, Haris

    Published 2023
    “…The research methodology involves the collection of a comprehensive data set from Kaggle containing a variety of gameplay features. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  11. 11

    Detection of energy theft and defective smart meters in smart grids using linear regression by Yip, S.C., Wong, K., Hew, W.P., Gan, M.T., Phan, R.C.W., Tan, S.W.

    Published 2017
    “…Simulations are conducted and the results show that the proposed algorithms can successfully detect all the fraudulent consumers and discover faulty smart meters in a neighborhood area network.…”
    Get full text
    Get full text
    Article
  12. 12

    An Optimized Semantic Segmentation Framework for Human Skin Detection by Huong, Audrey, Ngu, Xavier

    Published 2024
    “…This work identified that the location and color variability of skin pixels in the training data are crucial to obtaining a good skin segmentation performance. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Improvement on rooftop classification of worldview-3 imagery using object-based image analysis by Norman, Masayu

    Published 2019
    “…The accuracy of each algorithm was evaluated using LibSVM, Bayes network, and Adaboost classifier. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Heartbeat Anomaly Detection Method Based on Electrocardiogram using Improved Certainty Cognitive Map by Sumiati, .

    Published 2023
    “…This research has 3 objectives To develop algorithms for detecting heart conditions as either abnormal or normal using the modified cognitive map (CM) approach, To develop detection algorithms for anomalous heart conditions based on the enhancement of Certainty Factor (CF) technique, and To evaluate and validate the effectiveness of the new proposed model specifically the Certainty Cognitive Map (CCM) for identifying heart defects. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Non-weighted aggregate evaluation function of multi-objective optimization for knock engine modeling by Witwit, Azher Razzaq Hadi

    Published 2017
    “…The NWAEF model was compared to Random Weights Genetic Algorithm (RWGA) model by using five data sets taken from different internal combustion engines. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Power System State Estimation In Large-Scale Networks by NURSYARIZAL MOHD NOR, NURSYARIZAL

    Published 2010
    “…The gain and the Jacobian matrices associated with the basic algorithm require large storage and have to be evaluated at every iteration, resulting in more computation time. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Development of an explainable machine learning model for predicting depression in adults with type 2 diabetes mellitus: a cross-sectional SHAP-based analysis of NHANES 2009-2023 by Tang, Yan, Jia, Lei, Zhou, Junjun, Dou, Jin, Qian, Jingjuan, Yi, Xin, Soh, Kim Lam

    Published 2026
    “…Practical, interpretable risk tools using routine patient data are limited. We conducted a cross-sectional analysis using data from adults with T2DM enrolled in the National Health and Nutrition Examination Survey between 2009 and 2023. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Effect of mixing time and frequency-domain objectives in detecting problematic vibration on unmanned aerial vehicles via barnicle mating optimization by Fatimah, Dg Jamil, Mohammad Fadhil, Abas, Mohd Sharif, Zakaria, Norhafidzah, Mohd Saad, Mohd Hisyam, Ariff

    Published 2024
    “…Problematic vibration detection from Unmanned Aerial Vehicles (UAVs) as a flaw detection and identification (FDI) method has become a viable instrument for evaluating the health and condition of a UAV. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    A peer-to-peer blockchain based interconnected power system by Ahmed, Musse Mohamud, Mohammad Kamrul, Hasan, Muhammad, Shafiq, Md Ohirul, Qays, Gadekallu, Thippa Reddy, Nebhen, Jamel, Shayla, Islam

    Published 2021
    “…This paper uses a Shunt Active Power Filter (SHAPF). It describes the simulation analysis and reduction of harmonics detection in a peer-to-peer interconnected 3-phase power system with the help of an FFT algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20