Search Results - (( model evaluation styles algorithm ) OR ( wave identification system algorithm ))

Refine Results
  1. 1

    On the spectra efficiency of low-complexity and resolution hybrid precoding and combining transceivers for mmWave MIMO systems by Uwaechia, Anthony Ngozichukwuka, Mahyuddin, Nor Muzlifah, Mohd Fadzil, Ain, Abdul) Latiff, Nurul Muazzah, Za'bah, Nor Farahidah

    Published 2019
    “…T Millimeter wave (mmWave) multiple-input-multiple-output (MIMO) systems will almost certainly use hybrid precoding to realize beamforming with few numbers of RF chains to reduce energy consumption, but require low complexity technique to improve spectral efficiency. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Nonlinear System Identification of Floating Structures Using Time-Varying ARX–Based Volterra Model by Yazid, Edwar, Liew, M. S., Parman, Setyamartana, Kurian, V.J.

    Published 2014
    “…This method utilizes time series of measured wave heights as system input and surge motion as system output. …”
    Get full text
    Get full text
    Citation Index Journal
  3. 3
  4. 4

    Penilaian esei berbantukan komputer menggunakan teknik Bayesian dan pengunduran linear berganda by Mohamad @ Hamza, Mohd. Azwan

    Published 2006
    “…MMB Technique only required a small size of training data. (3) Prediction process of writing style using Multiple Linear Regression (MLR) Algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Virtual reality in algorithm programming course: practicality and implications for college students by Dewi, Ika Parma, Ambiyar, Mursyida, Lativa, Effendi, Hansi, Giatman, Muhammad, Efrizon, Hanafi, Hafizul Fahri, Ali, Siti Khadijah

    Published 2024
    “…The ADDIE model is applied in this study to develop products through the stages of analysis, design, development, implementation, and evaluation. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8

    Design of intelligent Qira’at identification algorithm by Kamarudin, Noraziahtulhidayu

    Published 2017
    “…To evaluate the algorithm, 350 samples for 10 types of Qira’at recitation are in used, and for justifying the best pattern classification, few algorithms are tested in the early preliminary evaluation with K-Nearest Neighbour, GMM and PPCA. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A stylometry approach for blind linguistic steganalysis model against translation-based steganography by Mohd Lokman, Syiham

    Published 2023
    “…This is because all translated in TBS text have an intrinsic structural styles that can be used to improve the performance of a blind steganalysis model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    RFID data reliability optimiser based on two dimensions bloom filter by Yaacob, Siti Salwani, Mahdin, Hairulnizam, Kasim, Shahreen

    Published 2017
    “…RFID system used radio waves to perform wireless interaction to detect and read data from the tagged object. …”
    Get full text
    Get full text
    Article
  11. 11

    Comparative study of informative acoustic features for VTOL UAV faulty prediction using machine learning by Mohd Sani, Fareisya Zulaikha, Makhtar, Siti Noormiza, Mohd Nor, Elya, Kamarudin, Nur Diyana, Md Ali, Syaril Azrad, Md Ali, Kurnianingsih

    Published 2025
    “…The propeller faulty conditions are predicted based on informative features extracted from statistical time domain parameters of three audio wave features. Pitch, zero-crossing and short-time energy are selected as the significant audio features for the machine learning classification algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Computational stylometric model for oath and oath-like expressions in Quranic text by Alqurneh, Ahmad

    Published 2014
    “…Two, various experimental results from the proposed model are compared against expert evaluation. The results showed that the proposed stylometric model of oaths has scalability in detecting implicit oaths, obtains dissimilar generalization levels in discriminating oath takers, and better adding in oath expressions explanation.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Adaptive multi-parent crossover GA for feature optimization in epileptic seizure identification by Al-Sharhan, Salah, Bimba, Andrew

    Published 2019
    “…Thus, we propose an adaptive multi-parent crossover Genetic Algorithm (GA) for optimizing the features used in classifying epileptic seizures. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Dyslexia handwriting detection using Convolutional Neural Network (CNN) algorithm / Sofea Najihah Mohd Zaki by Mohd Zaki, Sofea Najihah

    Published 2024
    “…This is because CNN can automatically extract new image data from written material. The CNN model is trained and evaluated on a wide range of handwritten sample datasets. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Grammar-based prosody modification for explicit control Malay language storytelling speech synthesis / Muhammad Izzad Ramli by Ramli, Muhammad Izzad

    Published 2018
    “…Consequently, new rules and algorithm that is MustFront rule, limitation rule, and two-steps pitch contour algorithm are introduced to increase the synthesized speech quality. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Development of a Negotiation Support Model for Value Management in Construction by UTOMO, CHRISTIONO

    Published 2009
    “…The research objectives are to find a theoretical basis and research approach for negotiation support methodology on VM, to develop a decision model for technical solution options in a satisfying function/cost preferences, to investigate negotiation style and outcome and analyze the correlation between them for the basis of scenarios on the agent system, to develop a model for agreement options and coalition algorithms on value-based decision, to validate the coalition algorithms and introduce an initial model of Negotiation Support for Value Management (NSVM). …”
    Get full text
    Get full text
    Final Year Project
  18. 18

    Evaluating endpoint detection algorithms for isolated word from Malay parliamentary speech by Seman N., Bakar Z.A., Bakar N.A., Mohamed H.F., Abdullah N.A.S., Ramakrisnan P., Ahmad S.M.S.

    Published 2023
    “…As a result, the Hidden Markov Model (HMM) recognizer derived the recognition accuracy rate of 91.4% for combination of both algorithms, if compared only 86.3% for STE and 82.1% for STZC rate alone. …”
    Conference paper
  19. 19

    Worst-case latency analysis for AVB traffic under overlapping-based time-triggered windows in time-sensitive networks by Shalghum, Khaled M., Noordin, Nor K., Sali, Aduwati, Hashim, Fazirulhisyam

    Published 2022
    “…Using an actual vehicular use case, the proposed models are evaluated with backto-back and porosity configurations under light and heavy loading scenarios. …”
    Get full text
    Get full text
    Article
  20. 20

    ECG biometric verification incorporating different physiological conditions by Mohd Azam, Siti Nurfarah Ain, Sidek, Khairul Azami, Dafhalla, Alaa Kamal Yousif

    Published 2025
    “…The liveness detection criteria of biological signals have become one of the reasons it has been introduced as an ideal biometric recognition system. Electrocardiogram (ECG) is one of the biological signals that records the rhythms of human’s heart in the form of PQRST waves proves the uniqueness of the ECG itself making it suitable to be applied as biometric mechanisms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article