Search Results - (( data evaluation based algorithm ) OR ( variables extraction method algorithm ))

Refine Results
  1. 1
  2. 2

    The framework of weighted subset-hood Mamdani fuzzy rule based system rule extraction (MFRBS-WSBA) for forecasting electricity load demand by Mansor, Rosnalini, Mat Kasim, Maznah, Othman, Mahmod

    Published 2016
    “…Fuzzy rules are very important elements that should be taken consideration seriously when applying any fuzzy system.This paper proposes the framework of Mamdani Fuzzy Rule-based System with Weighted Subset-hood Based Algorithm (MFRBS-WSBA) in the fuzzy rule extraction for electricity load demand forecasting.The framework consist of six main steps: (1) Data Collection and Selection; (2) Preprocessing Data; (3) Variables Selection; (4) Fuzzy Model; (5) Comparison with Other FIS and (6) Performance Evaluation. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    The framework of weighted subset-hood Mamdani fuzzy rule based system rule extraction (MFRBS-WSBA) for forecasting electricity load demand by Mansor, R., Kasim, M.M., Othman, M.

    Published 2016
    “…This paper proposes the framework of Mamdani Fuzzy Rule-based System with Weighted Subset-hood Based Algorithm (MFRBS-WSBA) in the fuzzy rule extraction for electricity load demand forecasting. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Improvement on rooftop classification of worldview-3 imagery using object-based image analysis by Norman, Masayu

    Published 2019
    “…Then, the classifier (support vector machine (SVM) and data mining (DM) algorithm, decision tree (DT) were applied on each fusion image and their accuracy were evaluated. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Liver segmentation on CT images using random walkers and fuzzy c-means for treatment planning and monitoring of tumors in liver cancer patients by Moghbel, Mehrdad

    Published 2017
    “…The proposed method is based on a hybrid method integrating random walkers algorithm with integrated priors and particle swarm optimized spatial fuzzy c-means (FCM) algorithm with level set method and AdaBoost classifier. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    High-Resolution Downscaling with Interpretable Relevant Vector Machine: Rainfall Prediction for Case Study in Selangor by Abdul Rashid, Raghdah Rasyidah, Shaharudin, Shazlyn Milleana, Sulaiman, Nurul Ainina Filza, Zainuddin, Nurul Hila, Mahdin, Hairulnizam, Mohd Najib, Summayah Aimi, Hidayat, Rahmat

    Published 2024
    “…The Principal Component Analysis (PCA) technique was employed to choose relevant environmental variables as input for the machine learning model, and various imputation methods were utilized to manage missing data, such as mean imputation and the KNN algorithm. …”
    Get full text
    Get full text
    Article
  8. 8

    Wavelet based fault tolerant control of induction motor / Khalaf Salloum Gaeid by Gaeid, Khalaf Salloum

    Published 2012
    “…The motor features are extracted through the proposed Discrete Wavelet Transform (DWT) based analysis method, while the wavelet inlet acts as an expert tool to adapt the right controller in accordance with the fault type. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Perturbation stochastic model updating of a bolted structure / Mohamad Azam Shah Aziz Shah by Aziz Shah, Mohamad Azam Shah

    Published 2022
    “…The SMU method based on the improved model was used to predict the variability of the dynamic behaviour of the structure. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Machine-learning approach using thermal and synthetic aperture radar data for classification of oil palm trees with basal stem rot disease by Che Hashim, Izrahayu

    Published 2021
    “…In an imbalanced dataset, one of the two classes contains fewer total samples than the other class. The sampling-based method, also known as the data level method, is used to deal with this problem. …”
    Get full text
    Get full text
    Thesis
  11. 11

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…Intrusion detection systems (IDSs) effectively balance additional security in a computer system by identifying intrusive activities on a computer system, and their enhancements are developing at a surprising rate. Detection methods based on statistical and data mining techniques are widely deployed as anomaly-based detection system (ADS). …”
    Get full text
    Get full text
    Thesis
  12. 12

    Coronary artery stenosis detection and visualization / Tang Sze Ling by Tang, Sze Ling

    Published 2015
    “…The proposed method benchmarked with the state-of-the-art methods and achieved comparable results. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Optimizing timber transportation planning for timber harvesting using bees algorithm in Malaysia by Jamaluddin, Jamhuri, Kamarudin, Norizah, Ismail, Mohd Hasmadi, Ahmad, Siti Azfanizam

    Published 2023
    “…A Bees Algorithm (BA) was proposed to find an optimum TTP for timber extraction, forest road, and landing locations with grid cell-sized 10 m × 10 m and attributed with fixed and variable costs. …”
    Get full text
    Get full text
    Article
  14. 14

    Multi road marking detection system for autonomous car using hybrid- based method by Shah, Khan Bahadur

    Published 2018
    “…Wu dataset that consist of 1208 road images, which were extracted from videos recorded around California, the proposed algorithm performed satisfactorily. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Centre-based hard clustering algorithms for Y-STR data / Ali Seman, Zainab Abu Bakar and Azizian Mohd. Sapawi by Seman, Ali, Abu Bakar, Zainab, Mohd. Sapawi, Azizian

    Published 2010
    “…The three algorithms above are experimented and evaluated in partitioning Y-STR haplogroups and Y-STR Surname data. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Case Slicing Technique for Feature Selection by A. Shiba, Omar A.

    Published 2004
    “…This technique with k = 10 has been used in this thesis to evaluate the proposed approach. CST was compared to other selected classification methods based on feature subset selection such as Induction of Decision Tree Algorithm (ID3), Base Learning Algorithm K-Nearest Nighbour Algorithm (k-NN) and NaYve Bay~sA lgorithm (NB). …”
    Get full text
    Get full text
    Thesis
  17. 17

    LCSS-Based Algorithm for Computing Multivariate Data Set Similarity: A Case Study of Real-Time WSN Data by Khan, Rahim, Ali, Ihsan, Altowaijri, Saleh, Zakarya, Muhammad, Rahman, Atiq Ur, Ahmedy, Ismail, Khan, Anwar, Gani, Abdullah

    Published 2019
    “…The proposed algorithm performs exceptionally well on numerous multivariate data sets compared with the classical dynamic programming-based algorithms. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream by Abdulateef, Alaa Fareed

    Published 2023
    “…Evaluation was made based on various evaluation metrics related to outlier detection and clustering quality. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20