Search Results - (( model application based algorithm ) OR ( user identification using algorithms ))*

Refine Results
  1. 1

    Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model by Yaacob, Mohd. Shafiek, Jamaluddin, Hishamuddin

    Published 2001
    “…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    A graphical user interface application for continuous-time identification of dynamical system by Rahmat, Mohd. Fua'ad, Omar, Rosli, Jamaluddin, Hishamuddin

    Published 2002
    “…This paper introduces a Graphical User Interface (GUI) application in system identification and parameter estimation of dynamic systems using Generalized Poisson Moment Functionals (GPMF) method based on Instrumental Variable (IV) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Fault Detection and Identification in Quadrotor System (Quadrotor Robot) by Chan, Shi Jing, Pebrianti, Dwi

    Published 2016
    “…This Artificial Neural Network (ANN) is an algorithm that is used to determine the type of fault and the severity level as well as isolate the fault from the system. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper by Yahya, Zahrah

    Published 2016
    “…Therefore, an automated application is required to transform paper sketches into three-dimensional models. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Stress mental health symptom assessment mobile application for young adults by Lee, Chun Hoong

    Published 2023
    “…Before this stage, the KNN algorithm is employed to construct the model using Google Form response data as part of the application development process. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    VHDL modeling of EMG signal classification using artificial neural network by Ahsan, Md. Rezwanul, Ibrahimy, Muhammad Ibn, Khalifa, Othman Omran, Ullah, Mohammad Habib

    Published 2012
    “…A back-propagation neural network with Levenberg-Marquardt training algorithm has been used for the classification of EMG signals. …”
    Get full text
    Get full text
    Article
  7. 7

    Selection and optimization of peak features for event-related eeg signals classification / Asrul bin Adam by Asrul, Adam

    Published 2017
    “…However, the developed algorithms only consider the selected features from a peak model based on the understanding of the EEG signals characteristics. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    Deployment of social nets in multi-layer model to identify Key individuals using majority voting by Shah, Asadullah

    Published 2019
    “…Many algorithms have been proposed to identify key players according to the objective of interest using suitable network centrality measures. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Convolutional neural network based mobile application for poisonous mushroom detection by Amirul, Shazlin Nizam, Mohd Sabri, Norlina, Gloria, Jennis Tan, Redwan, Nurul Ainina, Zhiping, Zhang

    Published 2025
    “…To address these issues, this study aims to develop a mushroom detection prototype specifically for identifying poisonous mushrooms using a mobile application. The application leverages a Convolutional Neural Network (CNN) algorithm to accurately classify mushrooms based on user-submitted images. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Deployment of social nets in multilayer model to identify key individuals using majority voting by Noor, Fozia, Shah, Asadullah, Akram, Muhammad Usman, Ahmad Khan, Shoab

    Published 2019
    “…Many algorithms have been proposed to identify key players according to the objective of interest using suitable network centrality measures. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Face detection of thermal images based on color image processing by Nur Farahana , Mat Khairi

    Published 2012
    “…Therefore, using a faster and less complex algorithm to do the general face detection is a faster way to identify faces. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    Zero distortion-based steganography for handwritten signature by Iranmanesh, Vahab

    Published 2018
    “…Thus, developing a steganographic algorithm to use cover media (c) without raising attention is the most challenging task in data hiding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Identifying suicidal ideation through twitter sentiment analysis using Naïve Bayes / Annasuha Atie Atirah Alias by Alias, Annasuha Atie Atirah

    Published 2023
    “…Thus, this project aims to design, develop, and evaluate web-based application utilizing sentiment analysis, specifically employing the Naïve Bayes algorithm, to identify and analyze suicidal ideation within Twitter posts. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Effective predicate identification algorithm for XML retrieval by Roko, Abubakar, C. Doraisamy, Shyamala, Nakone, Bello

    Published 2018
    “…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Crown counting and mapping of missing oil palm tree using airborne imaging system by Kee, Ya Wern

    Published 2019
    “…This helps to facilitate semi-skillful users to implement the tree counting algorithms. …”
    Get full text
    Get full text
    Thesis
  20. 20