Search Results - (( model selection method algorithm ) OR ( based construction cost algorithm ))

Refine Results
  1. 1

    Accuracy assessment of Digital Terrain Model (DTM) Constructed Cloth Simulation Filter (CSF) and Multi Curvature Classification (MCC) algorithm on UAV LiDAR dataset / Mohamad Khair... by Mohd Asri, Mohamad Khairan

    Published 2023
    “…Two algorithms, the Cloth Simulation Filter (CSF) in CloudCompare and the Multiscale Curvature Classification (MCC) in Global Mapper, were tested for this purpose. …”
    Get full text
    Get full text
    Student Project
  2. 2

    Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation by Chen, Qipeng, Xiong, Qiaoqiao, Huang, Haisong, Tang, Saihong, Liu, Zhenghong

    Published 2024
    “…Channel pruning and layer pruning are applied to the sparse model, and post-processing methods using knowledge distillation are used to effectively reduce the model size and forward inference time while maintaining model accuracy. …”
    Get full text
    Get full text
    Article
  3. 3

    Sequence analysis and homology modeling of mouse TRPV5 and TRPV6 channels / Azreena Izzaty Abd Manan by Abd Manan, Azreena Izzaty

    Published 2012
    “…In homology modeling method, the steps involved including selection of protein template, multiple sequence alignment of mouse TRPV5 and TRPV6 sequence with the protein template sequence by using the selected algorithms, transmembrane domain prediction, model development and finally, model comparison and evaluation. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Feedforward neural network for solving particular fractional differential equations by Admon, Mohd Rashid

    Published 2024
    “…Then, a single hidden layer of FNN based on Chelyshkov polynomials with an extreme learning machine algorithm (SHLFNNCP-ELM) is constructed for solving FDEsC. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    An enhanced supplier selection model based on optimized analytic network process towards sustainable information technology outsourcing by Fusiripong, Prashaya

    Published 2022
    “…Therefore, this study proposes an Enhanced Supplier Selection Model (ESS) for sustainable ITO mainly to eliminate human judgment in Analytical Network Process (ANP) method. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Linear programming approach for scheduling sports league problems in Malaysia by Ahmad Rosdi, Muhammad Ifwat

    Published 2017
    “…In order to solve the formulated LP model, we proposed several solution methods such as simplex and genetics algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    A comparative study on aviation arrival delay prediction using machine learning methods by Chew, Pui Ting

    Published 2023
    “…Considering the afore-mentioned model building methods for both approaches, ANN model using stepwise regression approach performs the best for flight arrival delay prediction based on F1 score. …”
    Get full text
    Thesis
  8. 8

    Channel assignment and congestion control in multi-radio multi-channel wireless mesh networks by Musaddiq, Arslan

    Published 2015
    “…OMNET++ simulation tool and graph theory concept have been used to model the network. The algorithm does not allow the node to switch to the channels in which non-intended nodes are operating. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Artificial intelligence-driven anticancer peptide discovery by Wu, Junrui, Ji, Shuaiqi, Sahibzada, Kashif Iqbal, Lou, Mengxue, An, Feiyu, Li, Wenqian, Guo, Jiawei, Zhang, Taowei, Zhang, Xinyi, Chou, Yilin, Zhang, Henan, Jin, Hao, Ma, Teng, Liu, Weichi, Alikulov, Begali, Golovneva, Natalia Alekseevna, Foo, Hooi Ling, Kuralay, Issayeva, Sun, Zhihong, Wei, Dongqing, Wu, Rina

    Published 2025
    “…Therefore, we presented a comprehensive ACP screening framework based on AI models. The presented framework includes data collection and organization, feature extraction, model construction, model interpretability analysis, and experimental validation. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Iterative Simulation-Based Design of a Multi Input Controller for a Hybrid Renewable Energy System by Abdullahi, Inusa

    Published 2021
    “…The design applies an algorithm to implement an object-oriented finite-state machines model constructed from Simulink to obtain a multiple-input single-output profile. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure by Asbullah, Muhammad Asyraf

    Published 2015
    “…In this thesis, we also develop a new cryptographic hard problem based on a special instance of a linear Diophantine equation in two variables, with some provided restrictions and carefully selected parameters. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Multiple equations model selection algorithm with iterative estimation method by Kamarudin, Nur Azulia, Ismail, Suzilah

    Published 2016
    “…In particular, an algorithm on model selection for seemingly unrelated regression equations model using iterative feasible generalized least squares estimation method is proposed. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    A new history matching sensitivity analysis framework with random forests and Plackett-Burman design by Aulia, A., Jeong, D., Mohd Saaid, I., Shuker, M.T., El-Khatib, N.A.

    Published 2017
    “…The one-parameterat- a-time method requires 21 samples, and the selected top 4 parameters from this method are mainly fault transmissibilities. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Model selection approaches of water quality index data by Kamarudin, Nur Azulia, Ismail, Suzilah

    Published 2016
    “…Automatic model selection by using algorithm can avoid huge variability in model specification process compared to manual selection.With the employment of algorithm, the right model selected is then also used for forecasting purposes. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Multi-base number representation in application to scalar multiplication and pairing computation by Mohammed Ismail, Abdelwahed

    Published 2011
    “…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Sure (EM)-Autometrics: An Automated Model Selection Procedure with Expectation Maximization Algorithm Estimation Method (S/O 14925) by Kamarudin, Nur Azulia

    Published 2021
    “…Hence, this study concentrates on an automated model selection procedure for the SURE model by integrating the expectation-maximization (EM) algorithm estimation method, named SURE(EM)-Autometrics. …”
    Get full text
    Get full text
    Monograph
  18. 18

    Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification by Abd Samad, Md Fahmi

    Published 2011
    “…Evolutionary computation (EC) is known to be an effective search and optimization method and in this paper EC is proposed as a model structure selection algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Parameter estimation of cocomo model using the jaya algorithm for software cost estimation by Tan, Jie Chee

    Published 2019
    “…To date, many techniques have been proposed to help the software engineer determine the actual software cost. This thesis proposed the Jaya algorithm based on estimation of the software based on the COCOMO I model. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    On the Computational Cost of Cocks’ Identity Based Encryption by Moo, Gabriel Ka Lin, Arif Mandangan, Rozaimi Zakaria

    Published 2018
    “…The first Identity Based Encryption scheme was constructed in 2001 based on elliptic curves and with pairings. …”
    Get full text
    Get full text
    Article