Search Results - (( media applications using algorithm ) OR ( using estimation methods algorithm ))

Refine Results
  1. 1

    Particle filter approach for estimating indoor mobile user location using IEEE 802.11 signals (F1090) by Mantoro, Teddy, Ayu, Media Anugerah, Raman, Shakiratul Husna, Md. Latiff , Nurul Hidayati

    Published 2011
    “…This creates problem in tracking user location indoor. Moreover, the use of light estimation algorithms such as fingerprinting, ranking algorithm, Weighted Centroid method, k-Nearest Neighbour, did not give a good tracking result. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    Particle filter approach for tracking indoor user location using IEEE 802.11 signals by Mantoro, Teddy, Ayu, Media Anugerah, Raman, Shakiratul Husna, Latiff , N. H. M.

    Published 2011
    “…This creates problem in tracking user location indoor. Moreover, the use of light estimation algorithms such as fingerprinting, ranking algorithm, Weighted Centroid method, k-Nearest Neighbour, did not give a good tracking result. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Lightweight spatial attentive network for vehicular visual odometry estimation in urban environments by Gadipudi, N., Elamvazuthi, I., Lu, C.-K., Paramasivam, S., Su, S.

    Published 2022
    “…Performed experiments demonstrate the promising performance of the proposed method to the methods used in the comparison. © 2022, The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature.…”
    Get full text
    Get full text
    Article
  4. 4

    Lightweight spatial attentive network for vehicular visual odometry estimation in urban environments by Gadipudi, N., Elamvazuthi, I., Lu, C.-K., Paramasivam, S., Su, S.

    Published 2022
    “…Performed experiments demonstrate the promising performance of the proposed method to the methods used in the comparison. © 2022, The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature.…”
    Get full text
    Get full text
    Article
  5. 5

    Estimating Marine CSEM Responses Using Gaussian Process Regression Based on Synthetic Models by Mohd Aris, M.N., Daud, H., Mohd Noh, K.A., Dass, S.C.

    Published 2022
    “…The computational time for evaluating the marine CSEM using GPR and FE are computed and compared. The resulting error measurements and the computational time revealed that GPR can estimate the marine CSEM responses efficiently and at par to the current methods. …”
    Get full text
    Get full text
    Article
  6. 6

    A decomposed streamflow non-gradientbased artificial intelligence forecasting algorithm with factoring in aleatoric and epistemic variables / Wei Yaxing by Wei , Yaxing

    Published 2024
    “…While the firefly algorithm solution is superior, it has a higher time complexity compared to other algorithms used when there are more hidden layers and neurons. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Slight-Delay Shaped Variable Bit Rate (SD-SVBR) Technique for Video Transmission by Ahmad Suki, Che Mohamed Arif

    Published 2011
    “…SVBR algorithm is devised for real-time video applications and it has several limitations and weaknesses due to its embedded estimation or prediction processes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Applications of contemporary artificial intelligence technology in forensic odontology as primary forensic identifier : A scoping review by Norhasmira, Mohammad, Rohana, Ahmad, Arofi, Kurniawan, Mohd Yusmiaidil, Putera Mohd Yusof

    Published 2022
    “…Background: Forensic odontology may require a visual or clinical method during identification. Sometimes it may require forensic experts to refer to the existing technique to identify individuals, for example, by using the atlas to estimate the dental age. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Application of boundary-fitted convolutional neural network to simulate non-Newtonian fluid flow behavior in eccentric annulus by Kumar, A., Ridha, S., Ilyas, S.U., Dzulkarnain, I., Pratama, A.

    Published 2022
    “…The performance of the algorithm is validated with experimental data available from published studies. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Machine learning techniques for reference evapotranspiration and rice irrigation requirements prediction: a case study of Kerian irrigation scheme, Malaysia by Mohd Nasir, Muhammad Adib, Harun, Sobri, Zainuddin, Zaitul Marlizawati, Kamal, Md Rowshon, Che Rose, Farid Zamani

    Published 2025
    “…ETo and rice irrigation requirements were first estimated using FAO Penman–Monteith (FAO-PM56) and the water balance model, respectively, and the obtained results were used as reference values in the machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    DEVELOPMENT OF COMPOSITIONAL MODEL FOR PREDICTING VISCOSITY OF CRUDE OILS USING POLYNOMIAL NEURAL NETWORKS (PNN) INDUCED BY GROUP METHOD OF DATA HANDLING (GMDH) by Wen Pin, Yong

    Published 2011
    “…Throughout the years, although many of the common correlations were developed, laboratory measurements still cannot be replaced due to the complexities, varied composition and reservoir characteristics difference from different reservoirs. This study estimates crude oil viscosity by using a group method of data handling (GMDH) based on polynomial neural network (PNN). …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Unified framework for spam detection and risk assessment in short message communication media / Adewole Kayode Sakariyah by Adewole Kayode, Sakariyah

    Published 2018
    “…A model to estimate the levels of risk of spam accounts is established using Fuzzy Analytic Hierarchy Process. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Skype multimedia application traffic analysis on home Unifi network / Siti Fatimah Ramle by Ramle, Siti Fatimah

    Published 2017
    “…Skype being considered for traffic analysis because it is one of the most online video media applications used in today's network communication. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Application of Machine Learning and Deep Learning Algorithms for Landslide Susceptibility Assessment in Landslide Prone Himalayan Region by Bhattacharya S., Ali T., Chakravortti S., Pal T., Majee B.K., Mondal A., Pande C.B., Bilal M., Rahman M.T., Chakrabortty R.

    Published 2025
    “…This study employs various machine learning and deep learning algorithms, specifically Random Forest (RF), Artificial Neural Network (ANN), and Deep Learning Neural Network (DLNN), to estimate landslide susceptibility in Chamoli district, Uttarakhand, India?…”
    Article
  18. 18

    Prediction of abrasive waterjet machining of sheet metals using artificial neural network by Nur Khadijah, Mazlan, Nazrin, Mokhtar, Asmelash, Mebrahitom Asmelash, Azmir, Azhari

    Published 2022
    “…A back-propagation algorithm used in the ANN model has successfully predicted the surface roughness with the mean squared error to be below 10%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Prediction of abrasive waterjet machining of sheet metals using artificial neural network by Nur Khadijah, Mazlan, Nazrin, Mokhtar, Gebremariam, Mebrahitom Asmelash, Azmir, Azhari

    Published 2022
    “…A back-propagation algorithm used in the ANN model has successfully predicted the surface roughness with the mean squared error to be below 10%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Multiple equations model selection algorithm with iterative estimation method by Kamarudin, Nur Azulia, Ismail, Suzilah

    Published 2016
    “…This estimation method is equivalent to maximum likelihood estimation at convergence. …”
    Get full text
    Get full text
    Get full text
    Article