Search Results - (( data identification using algorithm ) OR ( data implication machine algorithm ))
Search alternatives:
- identification using »
- data identification »
- machine algorithm »
- data implication »
- using algorithm »
-
1
Age detection from face using Convolutional Neural Network (CNN) / Hanin Hanisah Usok @ Yusoff
Published 2024“…In this project, we want to create an age identification system that uses Convolutional Neural Network (CNN) algorithms to estimate people's ages fast and accurately from facial images. …”
Get full text
Get full text
Thesis -
2
A comparative analysis of machine learning algorithms for diabetes prediction
Published 2024“…The methodology involves data collection, pre-processing, and training the algorithms using k-fold cross-validation. …”
Get full text
Get full text
Get full text
Article -
3
Using predictive analytics to solve a newsvendor problem / S. Sarifah Radiah Shariff and Hady Hud
Published 2023“…The best algorithm will not be the same for all the data sets. …”
Get full text
Get full text
Book Section -
4
Prediction of payment method in convenience stores using machine learning
Published 2023“…This study explores the application of machine learning techniques, specifically the Random Forest algorithm, to predict payment modes in the context of the Indonesian community. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Date store management in sliding window based on-line identification algorithms
Published 2001“…Sliding window identification algorithms use information from a store of data to optimise on-line learning. …”
Get full text
Get full text
Conference or Workshop Item -
6
Hybrid DE-PEM algorithm for identification of UAV helicopter
Published 2014“…Design/methodology/approach – In this study, flight data were collected and analyzed; MATLAB-based system identification algorithm was developed using DE and PEM; parameterized state-space model parameters were estimated using the developed algorithm and model dynamic analysis. …”
Get full text
Get full text
Get full text
Article -
7
Malware Classification and Detection using Variations of Machine Learning Algorithm Models
Published 2025“…Types of attacks can be Ping of Death, flooding, remote-controlled attacks, UDP flooding, and Smurf Attacks. Attack data was obtained from the ClaMP dataset, which has an unbalanced data set, and has very high noise, so it is necessary to analyze data packets in network logs and optimize feature extraction which is then analyzed statistically with machine learning algorithms. …”
Get full text
Get full text
Get full text
Article -
8
System identification using Extended Kalman Filter
Published 2017“…Besides, Extended Kalman Filter (EKF) algorithm was selected in this project as an algorithm for offline estimation data purposes. …”
Get full text
Get full text
Student Project -
9
-
10
-
11
Data mining based damage identification using imperialist competitive algorithm and artificial neural network
Published 2018“…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
Get full text
Get full text
Article -
12
Missing tags detection algorithm for radio frequency identification (RFID) data stream
Published 2019“…AC complement algorithm was used to compare the different in each set of data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…A deterministic mutation-based algorithm is introduced to overcome this problem. Identification studies using NARX (Nonlinear AutoRegressive with eXogenous input) models employing simulated systems and real plant data are used to demonstrate that the algorithm is able to detect significant variables and terms faster and to select a simpler model structure than other well-known EC methods.…”
Get full text
Get full text
Get full text
Article -
14
Enhancing project completion date prediction using a hybrid model: rule-based algorithm and machine learning algorithm
Published 2025“…The study employs a hybrid predictive model that combines Big Data technologies, Extract Load Transfer (ELT) processes, rule-based algorithms (RBA), machine learning (ML), and Power BI visualizations. …”
Get full text
Get full text
Get full text
Article -
15
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2016“…This paper proposes an algorithm frame-work to deal with these false paths through identification for DFT test. …”
Get full text
Get full text
Conference or Workshop Item -
16
Algorithm for rapid identification of flavonoids classes
Published 2017“…The study concluded that FTIR coupled with PCA analysis can be used as a molecular fingerprint for rapid identification of flavonoids.…”
Get full text
Get full text
Get full text
Get full text
Article -
17
Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification
Published 2007“…Several simulated systems and real-world timedependent data are used in the investigation. Comparisons based on widely used optimization performance indicators along with outcomes from other research are used. …”
Get full text
Get full text
Article -
18
Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification
Published 2007“…Several simulated systems and real-world timedependent data, are used in the investigation. Comparisons based on widely used optimization performance indicators along with outcomes from other research are used. …”
Get full text
Get full text
Article -
19
A review of the inter-correlation of climate change, air pollution and urban sustainability using novel machine learning algorithms and spatial information science
Published 2021“…The study also revealed that machine learning algorithms such as random forest, gradient boosting machine, and classification and regression trees (CART) accurately predict air pollution hazard when integrated with spatial models. …”
Get full text
Get full text
Article -
20
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2017“…This paper proposes an algorithm framework to deal with these false paths through identification for DFT test. …”
Get full text
Get full text
Article
