Search Results - (( data evaluation a algorithm ) OR ( variable detection using algorithm ))
Search alternatives:
- variable detection »
- data evaluation »
- using algorithm »
- evaluation a »
- a algorithm »
-
1
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Total 1600 different type of files were used for evaluation of the proposed algorithm, results show that 87% of injected objects were correctly detected…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…Identification studies using NARX (Nonlinear AutoRegressive with eXogenous input) models employing simulated systems and real plant data are used to demonstrate that the algorithm is able to detect significant variables and terms faster and to select a simpler model structure than other well-known EC methods.…”
Get full text
Get full text
Get full text
Article -
3
Enhancement of Space-Time Receiver Structure with Multiuser Detection for Wideband CDMA Communication Systems
Published 2006“…The adaptive algorithms are evaluated as a function of the number of iterations it takes to converge and its transmission performance are compared. …”
Get full text
Get full text
Thesis -
4
Evaluation of outlier filtering algorithms for accurate measurement of travel time reliability incorporating lane-splitting situations / Obada M. A. Asqool
Published 2022“…Thus, the Jang algorithm and TransGuide algorithm could be used after calibrating their parameters for each day. …”
Get full text
Get full text
Get full text
Thesis -
5
Damage visualization based on frequency shift of single-mode ultrasound-guided wavefield
Published 2022“…Overall, the results show that frequency analysis can detect the damage four times faster and the algorithm uses two-dimensional calculation instead of conventional three-dimensional of VTWAM method.…”
Get full text
Get full text
Article -
6
Haar cascade algorithm for microsleep detection
Published 2025“…During the development phase, the system was built in Python using OpenCV and dlib for real-time facial analysis and the Haar Cascade algorithm for efficient facial feature detection. …”
Get full text
Get full text
Article -
7
Single Fitness Function to Optimize Energy using Genetic Algorithms for Wireless Sensor Network
Published 2024journal::journal article -
8
Detection of leak size and its location in a water distribution system by using K-NN / Nasereddin Ibrahim Sherksi
Published 2020“…The successfully achieved four set objectives inclusive of (1) a new classification model to detect water leakage, (2) analysis of the effects of leakage size on the variables within a WDS, i.e. flow, pressure, pipe volume, velocity and water demand, (3) locating and specifying the leakage size in the WDS, and (4) evaluate the performance of the designed K-NN algorithm for accurate leak detection. …”
Get full text
Get full text
Thesis -
9
Development of a phantom and metal artifact correction (MAC) algorithm for post-operative spine computed tomography (CT) imaging / Noor Diyana Osman
Published 2014“…The last part is the development of a metal artifact correction (MAC) algorithm and evaluation of the proposed algorithm in artifacts reduction in CT images. …”
Get full text
Get full text
Thesis -
10
Predicting Cheaters in PlayerUnknown’s Battlegrounds (PUBG) using Random Forest Algorithm
Published 2023“…The research methodology involves the collection of a comprehensive data set from Kaggle containing a variety of gameplay features. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
11
Detection of energy theft and defective smart meters in smart grids using linear regression
Published 2017“…Simulations are conducted and the results show that the proposed algorithms can successfully detect all the fraudulent consumers and discover faulty smart meters in a neighborhood area network.…”
Get full text
Get full text
Article -
12
An Optimized Semantic Segmentation Framework for Human Skin Detection
Published 2024“…This work identified that the location and color variability of skin pixels in the training data are crucial to obtaining a good skin segmentation performance. …”
Get full text
Get full text
Get full text
Article -
13
Improvement on rooftop classification of worldview-3 imagery using object-based image analysis
Published 2019“…The accuracy of each algorithm was evaluated using LibSVM, Bayes network, and Adaboost classifier. …”
Get full text
Get full text
Thesis -
14
Heartbeat Anomaly Detection Method Based on Electrocardiogram using Improved Certainty Cognitive Map
Published 2023“…This research has 3 objectives To develop algorithms for detecting heart conditions as either abnormal or normal using the modified cognitive map (CM) approach, To develop detection algorithms for anomalous heart conditions based on the enhancement of Certainty Factor (CF) technique, and To evaluate and validate the effectiveness of the new proposed model specifically the Certainty Cognitive Map (CCM) for identifying heart defects. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Non-weighted aggregate evaluation function of multi-objective optimization for knock engine modeling
Published 2017“…The NWAEF model was compared to Random Weights Genetic Algorithm (RWGA) model by using five data sets taken from different internal combustion engines. …”
Get full text
Get full text
Get full text
Thesis -
16
Power System State Estimation In Large-Scale Networks
Published 2010“…The gain and the Jacobian matrices associated with the basic algorithm require large storage and have to be evaluated at every iteration, resulting in more computation time. …”
Get full text
Get full text
Thesis -
17
Development of an explainable machine learning model for predicting depression in adults with type 2 diabetes mellitus: a cross-sectional SHAP-based analysis of NHANES 2009-2023
Published 2026“…Practical, interpretable risk tools using routine patient data are limited. We conducted a cross-sectional analysis using data from adults with T2DM enrolled in the National Health and Nutrition Examination Survey between 2009 and 2023. …”
Get full text
Get full text
Get full text
Article -
18
Effect of mixing time and frequency-domain objectives in detecting problematic vibration on unmanned aerial vehicles via barnicle mating optimization
Published 2024“…Problematic vibration detection from Unmanned Aerial Vehicles (UAVs) as a flaw detection and identification (FDI) method has become a viable instrument for evaluating the health and condition of a UAV. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
A peer-to-peer blockchain based interconnected power system
Published 2021“…This paper uses a Shunt Active Power Filter (SHAPF). It describes the simulation analysis and reduction of harmonics detection in a peer-to-peer interconnected 3-phase power system with the help of an FFT algorithm. …”
Get full text
Get full text
Get full text
Article -
20
Variable weight Khazani-Syed code using hybrid fixed-dynamic technique for optical code division multiple access system
Published 2016“…A particular user or service has a varying weight applied to obtain the desired signal quality. …”
Get full text
Get full text
Article
