Search Results - (( data selection method algorithm ) OR ( parameter detection path algorithm ))

Refine Results
  1. 1

    Surface defect detection and polishing parameter optimization using image processing for G3141 cold rolled steel by Zamri, Ruzaidi

    Published 2016
    “…Results show that the defect detection algorithm able to detect defect only on the scratch area and able to read the Ga value at detected scratch line and transform it to surface roughness measurement at considerably good level of accuracy compared with manual method. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Effect of LiDAR mounting parameters and speed on HDL graph SLAM-Based 3D mapping for autonomous vehicles by Law, Jia Seng, Muhammad Aizzat, Zakaria, Younus, Maryam, Yong, Ericsson, Ismayuzri, Ishak, Mohamad Heerwan, Peeie, Muhammad Izhar, Ishak

    Published 2025
    “…This study investigates the physical calibration of a LiDAR sensor mounted on a moving vehicle and its effect on 3D map generation using the HDL Graph SLAM algorithm. HDL Graph SLAM was selected as the offline post-processing method due to its self-correcting functions for estimating and auto-correcting positional errors from LiDAR data. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Path Planning and Control of Mobile Robot in Road Environments using Sensor Fusion and Active Force Control by Ali, Mohammed A. H., Mailah, Musa

    Published 2018
    “…The sensor fusion algorithm is used to remove noises and uncertainties from sensors' data and provide optimum measurements for path planning. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    A novel bio-inspired routing algorithm based on ACO for WSNs by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A.

    Published 2019
    “…The issue of path selection to reach the nodes and vital correspondence parameters, for example, the versatility of nodes, their constrained vitality, the node residual energy and route length are considered since the communications parameters and imperatives must be taken into account by the imperative systems that mediate in the correspondence procedure, and the focal points of the subterranean insect framework have been utilized furthermore. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Multiple equations model selection algorithm with iterative estimation method by Kamarudin, Nur Azulia, Ismail, Suzilah

    Published 2016
    “…Meanwhile, real data analysis using water quality index displays excellent accomplishments when compared to other selection procedures.Consequently, iterative feasible generalized least squares method is regarded as a more suitable estimation method in this automated selection.It can also be seen that simultaneous selections outperform the individual selections.This strategy by executing simultaneous selection with iterative estimation method is therefore proven to outclass in this analysis.…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Application of the bees algorithm to the selection features for manufacturing data by Pham, D.T, Mahmuddin, Massudi, Otri, S., Al-Jabbouli, H.

    Published 2007
    “…Some of the features may contain irrelevant information caused by data redundancy or by noise. A “wrapper” feature selection method using the Bees Algorithm and Multilayer Perception (MLP) networks is described in this paper. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Case Slicing Technique for Feature Selection by A. Shiba, Omar A.

    Published 2004
    “…CST was compared to other selected classification methods based on feature subset selection such as Induction of Decision Tree Algorithm (ID3), Base Learning Algorithm K-Nearest Nighbour Algorithm (k-NN) and NaYve Bay~sA lgorithm (NB). …”
    Get full text
    Get full text
    Thesis
  10. 10

    Attribute related methods for improvement of ID3 Algorithm in classification of data: A review by Nur Farahaina, Idris, Mohd Arfian, Ismail

    Published 2020
    “…Results of the reviewed techniques show that attribute selection methods capable to resolve the limitations in ID3 algorithm and increase the performance of the method. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
    Get full text
    Get full text
    Thesis
  12. 12

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Experiments demonstrate that ensemble classifier learning method produces better accuracy mining data streams and selecting subset of relevant features comparing other single classifiers. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Sentiment classification for malay newspaper using clonal selection algorithm / Nur Fitri Nabila Mohamad Nasir by Mohamad Nasir, Nur Fitri Nabila

    Published 2013
    “…The experimental results show that our method can achieve better performance in clonal selection algorithm sentiment classification and the data collected cannot be used at once in this model because training data is very time-consuming if using all the data. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Mobile robot safe navigation in unknown environment by Shayestegan, Mohsen, Marhaban, Mohammad Hamiruce

    Published 2012
    “…The information about the target and the low-range sensory information are used by the controller to produce the commands that gives a favorable direction in terms of reaching to the target within the collision detection. Furthermore, the mobile robot does not suffer from typical ushape environment by a planned local minimum trapping algorithm and also designed controller is easy to understand, simple, and not sensitive to the system model parameters. …”
    Get full text
    Conference or Workshop Item
  15. 15

    Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms by Teoh, Chin Chuang

    Published 2005
    “…In cluster generating process, the developed BBSI algorithm was used to select the best band combination for generating cluster by using Iterative self- Organizing Data Analysis (ISODATA) technique. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    A partition based feature selection approach for mixed data clustering / Ashish Dutt by Ashish , Dutt

    Published 2020
    “…One such pre-processing algorithm in EDM is clustering. It is a widely used method in data mining to discover unique patterns in underlying data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Performance comparison of feature selection methods for prediction in medical data by Mohd Khalid, Nur Hidayah, Ismail, Amelia Ritahani, Abdul Aziz, Normaziah, Amir Hussin, Amir 'Aatieff

    Published 2023
    “…This study analyzes filter, wrapper, and embedded feature selection methods for medical data with the predictive machine learn- ing algorithm, Random Forest and CatBoost. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    AGENT MEETING SCHEDULER by ZAINAL ABIDIN, NURAINI

    Published 2011
    “…An agent meeting scheduler prototype then will be developed to prove that the selected algorithm is working properly. Qualitative research method is being used to gather necessary data on agent algorithm and this data will be used to select the suitable algorithm. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Determining the preprocessing clustering algorithm in radial basis function neural network by S.L. Ang, H.C. Ong, H.C. Law

    Published 2008
    “…Three types of method used in this study to find the centres include random selections, K-means clustering algorithm and also K-median clustering algorithm. …”
    Get full text
    Get full text
    Article