Search Results - (( data generation using algorithm ) OR ( parameter detection method algorithm ))

Refine Results
  1. 1

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…However, it is difficult to generate fuzzy parameters manually to classify data when it comes to a very complex problem. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff by Mohd Yusoff, Mohd Izhan

    Published 2014
    “…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Fuzzy modelling using firefly algorithm for phishing detection by Noor Syahirah, Nordin, Mohd Arfian, Ismail, Mezhuyev, Vitaliy, Shahreen, Kasim, Mohd Saberi, Mohamad, Ashraf Osman, Ibrahim

    Published 2019
    “…One of the suitable methods provides the Firefly Algorithm (FA). FA is a nature-inspired algorithm that uses fireflies’ behavior to interpret data. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation by Ahmadipour, Masoud

    Published 2019
    “…Non detection zone decreases to around zero and the proposed method has the ability to detect islanding up to 0.1% power mismatch. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Surface defect detection and polishing parameter optimization using image processing for G3141 cold rolled steel by Zamri, Ruzaidi

    Published 2016
    “…For the purpose of this study, multiple ANFIS or MANFIS have been selected to predict optimum parameter for polishing parameters. Polishing parameter data can be generated by using MANFIS to predict optimum polishing parameters such as grit size, polishing time and polishing force in order to perform polishing process. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Fault Detection and Identification in Quadrotor System (Quadrotor Robot) by Chan, Shi Jing, Pebrianti, Dwi

    Published 2016
    “…The aim of the research is to construct and design a Fault Detection and Isolation algorithm. This dynamic model is based on the first principles of the Quadrotor: Propeller model and its force as well as moments generation. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks / Wang Jie ... [et al.] by Wang, Jie, Mohd. Shah, Mohd. Kamal, Choong, Wai Heng, Al-Azad, Nahiyan

    Published 2024
    “…Simulated data are generated using ANSYS software by using models of semi-circular defects in steel pipes, producing magnetic leakage signals of varying intensities. …”
    Get full text
    Get full text
    Article
  9. 9

    Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks by Wang Jie, Mohd. Kamal Mohd. Shah, Choong Wai Heng, Nahiyan Al-Azad

    Published 2024
    “…Simulated data are generated using ANSYS software by using models of semi-circular defects in steel pipes, producing magnetic leakage signals of varying intensities. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Federated deep learning for automated detection of diabetic retinopathy by Zainal Abidin, Nadzurah, Ismail, Amelia Ritahani

    Published 2022
    “…Deep learning is a machine learning algorithm with potential for detecting the significance of DR. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Adaptive template matching of photoplethysmogram pulses to detect motion artefact by Lim, Pooi Khoon, Ng, Siew Cheok, Lovell, Nigel Hamilton, Yu, Yong Poh, Tan, Maw Pin, McCombie, Devin, Lim, Einly, Redmond, Stephen James

    Published 2018
    “…The performance of our algorithm was evaluated using data obtained from two different sources: (i) our own data collected from 19 healthy subjects using the wearable Sotera Visi Mobile system (Sotera Wireless Inc.) as they performed various movement types; and (ii) ICU data provided by the PhysioNet MIMIC II database. …”
    Get full text
    Get full text
    Article
  12. 12

    Photogrammetric low-cost unmanned aerial vehicle for pothole detection mapping / Shahrul Nizan Abd Mukti by Abd Mukti, Shahrul Nizan

    Published 2022
    “…The study set four main objectives to achieve its aim: (1) To analyse RGB and multispectral sensor calibration, (2) To evaluate the optimal flight parameters for pothole modelling production using RGB imagery, (3) To investigate various classifier algorithms and band combinations for pothole region areas using multispectral imagery and (4) To validate geometric information from the extracted pothole. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Design and analysis of an early heart attack detection using openCV by Muhammad Rafsanjani, Basri, Fahmi, Samsuri

    Published 2022
    “…Next, in this project, website prediction of the heart attack prediction are build using python and flask framework. Hyper-parameter tuning method also has been applied to see does the algorithm increase accuracy or not.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Em Approach on Influence Measures in Competing Risks Via Proportional Hazard Regression Model by Elfaki, Faiz. A. M.

    Published 2000
    “…A generated data where the failure times were taken as exponentially distributed was used to further compare these two methods of estimation. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Improvement on rooftop classification of worldview-3 imagery using object-based image analysis by Norman, Masayu

    Published 2019
    “…The accuracy of each algorithm was evaluated using LibSVM, Bayes network, and Adaboost classifier. …”
    Get full text
    Get full text
    Thesis
  17. 17

    G2 parametric curve and surface fitting using beta-spline / Normi Abdul Hadi by Abdul Hadi, Normi

    Published 2015
    “…In beta-spline curve fitting, the control points are calculated using least squares method. The data points are first segmented in comer detection process, then the curve control points are calculated based on the comer points. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Hybrid fault detection using kalman filter and neural network for quadrotor micro aerial vehicle by Chan, Shi Jing

    Published 2018
    “…The proposed method for the fault detection in this study uses hybrid technique which combines the extended kalman filter and artificial neural network (ANN). …”
    Get full text
    Get full text
    Thesis
  19. 19

    Learner’s emotion prediction using production rules classification algorithm through brain computer interface tool by Nurshafiqa Saffah, Mohd Sharif

    Published 2018
    “…From the data analysis using WEKA software, the production rules classifier (PART) is found to be the most accurate classification algorithm in classifying the emotion which yields the highest precision percentage of 99.6% compared to J48 (99.5%) and Naïve Bayes (96.2%). …”
    Get full text
    Get full text
    Thesis
  20. 20

    Adaptive Control of Weld Penetration and Trajectory for Robotic GTAW by Sadeghi, Mir Bahram H.

    Published 1996
    “…Also, it was found that scanning of a certain region of the captured image in front of the weld puddle decreases the data processing time drastically. In continuation of this work, a cascade control system for control of welding velocity as well as an algorithm for off·line generation and control of weld 3-D trajectory was developed.…”
    Get full text
    Get full text
    Thesis