Search Results - (( model application based algorithm ) OR ( user identification using algorithms ))*
Search alternatives:
- identification using »
- user identification »
- model application »
- application based »
- using algorithms »
-
1
Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model
Published 2001“…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
Get full text
Get full text
Get full text
Article -
2
A graphical user interface application for continuous-time identification of dynamical system
Published 2002“…This paper introduces a Graphical User Interface (GUI) application in system identification and parameter estimation of dynamic systems using Generalized Poisson Moment Functionals (GPMF) method based on Instrumental Variable (IV) algorithm. …”
Get full text
Get full text
Get full text
Article -
3
Fault Detection and Identification in Quadrotor System (Quadrotor Robot)
Published 2016“…This Artificial Neural Network (ANN) is an algorithm that is used to determine the type of fault and the severity level as well as isolate the fault from the system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper
Published 2016“…Therefore, an automated application is required to transform paper sketches into three-dimensional models. …”
Get full text
Get full text
Thesis -
5
Stress mental health symptom assessment mobile application for young adults
Published 2023“…Before this stage, the KNN algorithm is employed to construct the model using Google Form response data as part of the application development process. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
VHDL modeling of EMG signal classification using artificial neural network
Published 2012“…A back-propagation neural network with Levenberg-Marquardt training algorithm has been used for the classification of EMG signals. …”
Get full text
Get full text
Article -
7
Selection and optimization of peak features for event-related eeg signals classification / Asrul bin Adam
Published 2017“…However, the developed algorithms only consider the selected features from a peak model based on the understanding of the EEG signals characteristics. …”
Get full text
Get full text
Get full text
Thesis -
8
-
9
Integrated OBF-NN models with enhanced extrapolation capability for nonlinear systems
Published 2013Get full text
Get full text
Get full text
Citation Index Journal -
10
Deployment of social nets in multi-layer model to identify Key individuals using majority voting
Published 2019“…Many algorithms have been proposed to identify key players according to the objective of interest using suitable network centrality measures. …”
Get full text
Get full text
Get full text
Article -
11
Convolutional neural network based mobile application for poisonous mushroom detection
Published 2025“…To address these issues, this study aims to develop a mushroom detection prototype specifically for identifying poisonous mushrooms using a mobile application. The application leverages a Convolutional Neural Network (CNN) algorithm to accurately classify mushrooms based on user-submitted images. …”
Get full text
Get full text
Get full text
Article -
12
Deployment of social nets in multilayer model to identify key individuals using majority voting
Published 2019“…Many algorithms have been proposed to identify key players according to the objective of interest using suitable network centrality measures. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
13
Face detection of thermal images based on color image processing
Published 2012“…Therefore, using a faster and less complex algorithm to do the general face detection is a faster way to identify faces. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Zero distortion-based steganography for handwritten signature
Published 2018“…Thus, developing a steganographic algorithm to use cover media (c) without raising attention is the most challenging task in data hiding. …”
Get full text
Get full text
Get full text
Thesis -
15
-
16
Identifying suicidal ideation through twitter sentiment analysis using Naïve Bayes / Annasuha Atie Atirah Alias
Published 2023“…Thus, this project aims to design, develop, and evaluate web-based application utilizing sentiment analysis, specifically employing the Naïve Bayes algorithm, to identify and analyze suicidal ideation within Twitter posts. …”
Get full text
Get full text
Thesis -
17
Effective predicate identification algorithm for XML retrieval
Published 2018“…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
Get full text
Get full text
Conference or Workshop Item -
18
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
Get full text
Get full text
Get full text
Thesis -
19
Crown counting and mapping of missing oil palm tree using airborne imaging system
Published 2019“…This helps to facilitate semi-skillful users to implement the tree counting algorithms. …”
Get full text
Get full text
Thesis -
20
