Search Results - (( data identification _ algorithm ) OR ( variable extraction method algorithm ))
Search alternatives:
- data identification »
- variable extraction »
- extraction method »
- method algorithm »
-
1
CAT CHAOTIC GENETIC ALGORITHM BASED TECHNIQUE AND HARDWARE PROTOTYPE FOR SHORT TERM ELECTRICAL LOAD FORECASTING
Published 2017“…The correlation analysis is used for the identification and selection of the most influential input variable vector (IVV). …”
Get full text
Get full text
Thesis -
2
Towards enhanced remaining useful life prediction of lithium-ion batteries with uncertainty using optimized deep learning algorithm
Published 2025“…However, existing RUL prediction approaches have difficulties with variability and nonlinearity that occur during battery degradation, data extraction, feature extraction, hyperparameters optimization, and prediction model uncertainty. …”
Article -
3
Analysis of Traffic Accident Patterns Using Association Rule Mining
Published 2024“…The application of the apriori algorithm facilitated the identification of frequent itemsets and rules that reveal patterns across accident variables, such as road conditions, road functions, accident types, weather conditions, and victim statuses. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Multi-sensor fusion and deep learning framework for automatic human activity detection and health monitoring using motion sensor data / Henry Friday Nweke
Published 2019“…Third, to propose orientation invariant based deep spare autoencoder methods for automatic complex activity identification to minimize orientation inconsistencies and learn adequate data patterns. …”
Get full text
Get full text
Get full text
Thesis -
5
Tree species and aboveground biomass estimation using machine learning, hyperspectral and LiDAR data / Nik Ahmad Faris Nik Effendi
Published 2022“…In this research, Object-Based Image Analysis (OBIA) method was applied on hyperspectral data to extract the crown of individual tree species for classification and estimation purposes. …”
Get full text
Get full text
Thesis -
6
Oil palm female inflorescences anthesis stages identification using selected emissivities through thermal imaging and Machine Learning
Published 2022“…This research studies different Machine Learning (ML) classification and ensemble techniques for the assessment of the four pollination stages consist of pre-anthesis I, pre-anthesis II, pre-anthesis III, and anthesis using thermal imaging. Different ML algorithms such as Random Forest (RF), k Nearest Neighbor (kNN), Support Vector Machine (SVM), Artificial Neural Network (ANN) as well as an ensemble method are used on data extracted from thermal images collected during infield oil palms pollination stages monitoring. …”
Get full text
Get full text
Get full text
Thesis -
7
A comparative analysis of QRS and cardioid graph based ECG biometric recognition in different physiological conditions
Published 2014“…Subjects were recognized with Multilayer Perceptron classification algorithm. Results were obtained through two approaches. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Evaluation and Comparative Analysis of Feature Extraction Methods on Image Data to increase the Accuracy of Classification Algorithms
Published 2024“…The feature extraction methods evaluated were Grayscale Pixel Values, Mean Pixel Value of Channels, and Extracting Edge Features. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Machine-learning approach using thermal and synthetic aperture radar data for classification of oil palm trees with basal stem rot disease
Published 2021“…In an imbalanced dataset, one of the two classes contains fewer total samples than the other class. The sampling-based method, also known as the data level method, is used to deal with this problem. …”
Get full text
Get full text
Thesis -
10
Fsm-Based Enhanced March C- Algorithm For Memory Built-In Self-Test
Published 2017“…Through the analysis of the fault patterns and other algorithm, it was found that multiple read operation within a single MARCH element from MARCH-NU algorithm can aid in the identification of the Read Destructive Fault whereas having HOLD time in the MARCH 9N algorithm would expose the Data Retention Fault. …”
Get full text
Get full text
Thesis -
11
Coronary artery stenosis detection and visualization / Tang Sze Ling
Published 2015“…The proposed method benchmarked with the state-of-the-art methods and achieved comparable results. …”
Get full text
Get full text
Thesis -
12
Optimizing timber transportation planning for timber harvesting using bees algorithm in Malaysia
Published 2023“…A Bees Algorithm (BA) was proposed to find an optimum TTP for timber extraction, forest road, and landing locations with grid cell-sized 10 m × 10 m and attributed with fixed and variable costs. …”
Get full text
Get full text
Article -
13
Multi road marking detection system for autonomous car using hybrid- based method
Published 2018“…Wu dataset that consist of 1208 road images, which were extracted from videos recorded around California, the proposed algorithm performed satisfactorily. …”
Get full text
Get full text
Get full text
Thesis -
14
Date store management in sliding window based on-line identification algorithms
Published 2001“…Sliding window identification algorithms use information from a store of data to optimise on-line learning. …”
Get full text
Get full text
Conference or Workshop Item -
15
Hybrid DE-PEM algorithm for identification of UAV helicopter
Published 2014“…Findings – The proposed hybrid algorithm improves the performance of the PEM algorithm in the identification of an autonomous helicopter model. …”
Get full text
Get full text
Get full text
Article -
16
Recursive Subspace Identification Algorithm Using The Propagator Based Method
Published 2017“…Hence, it is essential to discover the alternative algorithms in order to apply the concept of subspace identification recursively. …”
Get full text
Get full text
Get full text
Article -
17
System identification using Extended Kalman Filter
Published 2017“…Besides, Extended Kalman Filter (EKF) algorithm was selected in this project as an algorithm for offline estimation data purposes. …”
Get full text
Get full text
Student Project -
18
Missing tags detection algorithm for radio frequency identification (RFID) data stream
Published 2019“…AC complement algorithm was used to compare the different in each set of data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…System identification is a method of determining a mathematical relation between variables and terms of a process based on observed input-output data. …”
Get full text
Get full text
Get full text
Article -
20
Data mining based damage identification using imperialist competitive algorithm and artificial neural network
Published 2018“…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
Get full text
Get full text
Article
