Search Results - (( data identification using algorithm ) OR ( variable generation using algorithm ))

Refine Results
  1. 1

    Gas Identi cation by Using a Cluster-k-Nearest-Neighbor by Brahim Belhaouari, samir

    Published 2009
    “…We find 98.7% of accuracy in the classification of 6 different types of Gas by using K-means cluster algorithm and we find almost the same by using the new clustering algorithm.…”
    Get full text
    Get full text
    Article
  2. 2

    SLIDING WINDOW TRAINING ALGORITHMS USING MLP-NETWORK FOR CORRELATED AND LOST PACKET DATA by AHMED IZZELDIN, HUZAIFA TAWFEIG

    Published 2012
    “…MLPs are well-known tools used in nonlinear system identification, statistical modelling, adaptive control signal, image processing and for many applications. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Damage visualization based on frequency shift of single-mode ultrasound-guided wavefield by Shahrim, Muhamad Azim, Harmin, Mohammad Yazdi, Romli, Fairuz Izzuddin, Chia, Chen Ciang, Jung-Ryul, Lee

    Published 2022
    “…Last but not least, the comparison of accuracy between frequency analysis algorithm and variable time window amplitude mapping (VTWAM) algorithm is performed. …”
    Get full text
    Get full text
    Article
  4. 4

    Modeling of cupping suction system based on system identification method by Kavindran, Suresh

    Published 2022
    “…The input and output data were used to create this modeling output variable of the cupping suction system is detected by connecting a differential pressure sensor to the cup, while the input variable is determined by the speed of the pump applied in various locations. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5
  6. 6

    Seismic wave modeling and high-resolution imaging by Bashir, Y., Ghosh, D.P., Alashloo, S.Y.M.

    Published 2022
    “…The primary goal of this chapter was to develop and apply diffraction theory in order to better understand diffraction phenomena. Using input seismic variables such as velocity, frequency, depth, and migration aperture, an algorithm is developed to observe the behavior of diffraction hyperbolas. …”
    Get full text
    Get full text
    Book
  7. 7

    Zero distortion-based steganography for handwritten signature by Iranmanesh, Vahab

    Published 2018
    “…Thus, developing a steganographic algorithm to use cover media (c) without raising attention is the most challenging task in data hiding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Developing dengue index through the integration of crowdsourcing approach (X-Waba) by makroui, Lyes, Hj. Mohd. Noor, Norzailawati, Abdullah, Alias

    Published 2018
    “…This research aims at improving the existing dengue indices by developing an algorithm that would use the variables affecting positively the vector’s lifecycle and monitoring them daily to generate an improved Dengue Index that would help forewarn on the high possibility of a dengue outbreak. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Identification of debris flow initiation zones using topographic model and airborne laser scanning data by Lay, Usman Salihu, Pradhan, Biswajeet

    Published 2017
    “…MARSpline multivariate data mining predictive approach was implemented using morphometric indices and topographical derived parameter as independent variables. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Non-fungible token based smart manufacturing to scale Industry 4.0 by using augmented reality, deep learning and industrial Internet of Things by Ahmed Khan, Fazeel, Ibrahim, Adamu Abubakar

    Published 2023
    “…The next phase was deploying deep learning algorithms on a dataset having data generated from IIoT devices and sensors. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Multi-sensor fusion and deep learning framework for automatic human activity detection and health monitoring using motion sensor data / Henry Friday Nweke by Henry Friday , Nweke

    Published 2019
    “…Furthermore, to confirm the performances of the proposed multi-sensor fusion methods using challenging motion sensor data generated using smartphones and wearable sensors. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Date store management in sliding window based on-line identification algorithms by Asirvadam , Vijanth Sagayan, McLoone, Sean, Irwin, George W

    Published 2001
    “…Sliding window identification algorithms use information from a store of data to optimise on-line learning. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Adapting the Elitism on the Greedy Algorithm for Variable Strength Combinatorial Test Cases Generation by Bahomaid, Ameen A., Alsewari, Abdulrahman A., Zamli, Kamal Z., Alsariera, Yazan A.

    Published 2018
    “…This study presented the most recent variable interaction strength (VS) CT strategy using an enhanced variant in the greedy algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Hybrid DE-PEM algorithm for identification of UAV helicopter by Tijani, Ismaila, Akmeliawati, Rini, Legowo, Ari, Budiyono, Agus, Abdul Muthalif, Asan Gani

    Published 2014
    “…Design/methodology/approach – In this study, flight data were collected and analyzed; MATLAB-based system identification algorithm was developed using DE and PEM; parameterized state-space model parameters were estimated using the developed algorithm and model dynamic analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    System identification using Extended Kalman Filter by Alias, Ahmad Hafizi

    Published 2017
    “…Besides, Extended Kalman Filter (EKF) algorithm was selected in this project as an algorithm for offline estimation data purposes. …”
    Get full text
    Get full text
    Student Project
  16. 16
  17. 17

    Data mining based damage identification using imperialist competitive algorithm and artificial neural network by Gordan, Meisam, Razak, Hashim Abdul, Ismail, Zubaidah, Ghaedi, Khaled

    Published 2018
    “…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Missing tags detection algorithm for radio frequency identification (RFID) data stream by Zainudin, Nur 'Aifaa

    Published 2019
    “…AC complement algorithm was used to compare the different in each set of data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification by Abd Samad, Md Fahmi

    Published 2011
    “…A deterministic mutation-based algorithm is introduced to overcome this problem. Identification studies using NARX (Nonlinear AutoRegressive with eXogenous input) models employing simulated systems and real plant data are used to demonstrate that the algorithm is able to detect significant variables and terms faster and to select a simpler model structure than other well-known EC methods.…”
    Get full text
    Get full text
    Get full text
    Article