Search Results - (( data evaluation a algorithm ) OR ( variable extractions using algorithm ))

Refine Results
  1. 1
  2. 2

    Development of an effective clustering algorithm for older fallers by Goh, Choon Hian, Wong, Kam Kang, Tan, Maw Pin *, Ng, Siew Cheok, Chuah, Yea Dat, Kwan, Ban Hoe

    Published 2022
    “…A total of 1279 subjects and 9 variables were selected for clustering after the data pre-possessing stage. …”
    Get full text
    Get full text
    Article
  3. 3

    Development of a phantom and metal artifact correction (MAC) algorithm for post-operative spine computed tomography (CT) imaging / Noor Diyana Osman by Osman, Noor Diyana

    Published 2014
    “…The last part is the development of a metal artifact correction (MAC) algorithm and evaluation of the proposed algorithm in artifacts reduction in CT images. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Improvement on rooftop classification of worldview-3 imagery using object-based image analysis by Norman, Masayu

    Published 2019
    “…The accuracy of each algorithm was evaluated using LibSVM, Bayes network, and Adaboost classifier. …”
    Get full text
    Get full text
    Thesis
  6. 6

    The framework of weighted subset-hood Mamdani fuzzy rule based system rule extraction (MFRBS-WSBA) for forecasting electricity load demand by Mansor, R., Kasim, M.M., Othman, M.

    Published 2016
    “…The framework consist of six main steps: (1) Data Collection and Selection; (2) Preprocessing Data; (3) Variables Selection; (4) Fuzzy Model; (5) Comparison with Other FIS and (6) Performance Evaluation. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8
  9. 9

    Mortality prediction in critically ill patients using machine learning score by Fatimah, Dzaharudin, Azrina, Md Ralib, Ummu Kulthum, Jamaludin, Mohd Basri, Mat Nor, Afidalina, Tumian, Har, Lim Chiew, Ceng, T. C.

    Published 2020
    “…The algorithm was validated with data obtained from a retrospective study on ICU patients in Malaysia. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Liver segmentation on CT images using random walkers and fuzzy c-means for treatment planning and monitoring of tumors in liver cancer patients by Moghbel, Mehrdad

    Published 2017
    “…This is followed by the clustering of the liver tissues using particle swarm optimized spatial FCM algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Clinical relevance of VKORC1 (G-1639A and C1173T) and CYP2C9*3 among patients on warfarin by Teh, L. K., Langmia, I. M., M. H., Fazleen Haslinda, Ngow, Harris Abdullah, Roziah, M. J., Harun, R., Zakaria, Z. A., Salleh, M. Z.

    Published 2011
    “…An initial model was developed using data from one cohort of patients and validated using data from a second cohort. …”
    Get full text
    Get full text
    Article
  12. 12

    High-Resolution Downscaling with Interpretable Relevant Vector Machine: Rainfall Prediction for Case Study in Selangor by Abdul Rashid, Raghdah Rasyidah, Shaharudin, Shazlyn Milleana, Sulaiman, Nurul Ainina Filza, Zainuddin, Nurul Hila, Mahdin, Hairulnizam, Mohd Najib, Summayah Aimi, Hidayat, Rahmat

    Published 2024
    “…The Principal Component Analysis (PCA) technique was employed to choose relevant environmental variables as input for the machine learning model, and various imputation methods were utilized to manage missing data, such as mean imputation and the KNN algorithm. …”
    Get full text
    Get full text
    Article
  13. 13

    Classification and prediction analysis for weld bead surface quality using feature extraction and mahalanobis-taguchi system by Nolia, Harudin, Muhammad Ikmal Hafiz, Mohd Yusof, Zulkifli, Marlah@Marlan, Faizir, Ramlie, Wan Zuki Azman, Wan Muhamad, Mohd Yazid, Abu, Zamzuraida, Baharum

    Published 2025
    “…Leveraging image feature extraction in combination with the Mahalanobis-Taguchi System (MTS) implemented in MATLAB software, the study constructs a tailored camera jig to ensure consistent image data capture. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Wavelet based fault tolerant control of induction motor / Khalaf Salloum Gaeid by Gaeid, Khalaf Salloum

    Published 2012
    “…There are two steps in the fault tolerant control process; in the first step the fault is identified with the feature extraction module, a fault decision module and a feature cluster module. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Machine-learning approach using thermal and synthetic aperture radar data for classification of oil palm trees with basal stem rot disease by Che Hashim, Izrahayu

    Published 2021
    “…The machine learning algorithm consistently performs well when presented with a well-balanced dataset. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…Obfuscation involves transforming potentially revealing data, renaming useful classes and variables (identifiers) names to meaningless labels or adding unused or meaningless code to an application binary. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Perturbation stochastic model updating of a bolted structure / Mohamad Azam Shah Aziz Shah by Aziz Shah, Mohamad Azam Shah

    Published 2022
    “…The scheme was developed by introducing a multidimensional analysis consisting of a systematic quasi-random sampling algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Classification for large number of variables with two imbalanced groups by Ahmad Hakiim, Jamaluddin

    Published 2020
    “…This study proposed two algorithms of classification namely Algorithm 1 and Algorithm 2 which combine resampling, variable extraction, and classification procedure. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Anomaly detection of denial-of-service network traffic attacks using autoencoders and isolation forest by Ghulam Hussain, Muhammad Thaqif, Shafeeq Lone, Aman, Maspo, Nur-Adib, Attarbashi, Zainab

    Published 2026
    “…This paper presents an unsupervised network-based anomaly detection framework that integrates deep autoencoders with the Isolation Forest algorithm. The framework analyzes extracted traffic features, including packet length and IP address patterns, to detect deviations from normal behaviour without requiring labelled data. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20