Search Results - (( model validation method algorithm ) OR ( user identification _ algorithm ))*
Search alternatives:
- user identification »
- validation method »
- method algorithm »
-
1
Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model
Published 2001“…The correlation based model validity tests are used to validate the identified fuzzy model.…”
Get full text
Get full text
Get full text
Article -
2
A graphical user interface application for continuous-time identification of dynamical system
Published 2002“…This paper introduces a Graphical User Interface (GUI) application in system identification and parameter estimation of dynamic systems using Generalized Poisson Moment Functionals (GPMF) method based on Instrumental Variable (IV) algorithm. …”
Get full text
Get full text
Get full text
Article -
3
Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper
Published 2016“…The algorithm is validated by conducting manual ground truth and the results were compared with the closest and well-known methods. …”
Get full text
Get full text
Thesis -
4
Self-calibration algorithm for a pressure sensor with a real-time approach based on an artificial neural network
Published 2018“…To verify the proposed model’s capability to build a self-calibration algorithm, the model was tested using an untrained input data set. …”
Get full text
Get full text
Get full text
Article -
5
Real time self-calibration algorithm of pressure sensor for robotic hand glove system
Published 2019“…The model was tested using an untrained input data set in order to verify the Proposed model’s capability for implementing a self-calibration algorithm. …”
Get full text
Get full text
Thesis -
6
Identification of non-equilibrium growth for bitcoin exchange rate: mathematical derivation method in Islamic financial engineering
Published 2017“…Crptocurrency is a type of digital currency that using decentralized method for validating transaction. In the same time, the user of the Bitcoin is protected using hash algorithm. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Digital video broadcasting satellite-based passive forward scatter radar for drone detection based on micro Doppler analysis
Published 2019“…An empirical mode decomposition (EMD) algorithm was then used to extract the feature vectors present in the acquired signature. …”
Get full text
Get full text
Thesis -
9
Effective predicate identification algorithm for XML retrieval
Published 2018“…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
Get full text
Get full text
Conference or Workshop Item -
10
Analysis of Online Social Network Connections for Identification of Influential Users
Published 2018“…This article presents a detailed survey of influential users’ identification algorithms and their performance evaluation approaches in OSNs. …”
Get full text
Get full text
Article -
11
Analysis of Toothbrush Rig Parameter Estimation Using Different Model Orders in Real Coded Genetic Algorithm (RCGA)
Published 2024“…The validation test-through correlation analysis was used to validate the model. …”
Article -
12
Analysis of toothbrush rig parameter estimation using different model orders in Real-Coded Genetic Algorithm (RCGA)
Published 2018“…The validation test-through correlation analysis was used to validate the model. …”
Get full text
Article -
13
-
14
-
15
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
Get full text
Get full text
Get full text
Thesis -
16
Development of person identification application for video surveillance
Published 2022“…The information of the tracker is necessary for person identification. Third, person identification implemented the CNN model for training. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Dynamic modelling of a flexible beam structure using feedforward neural networks for active vibration control
Published 2019“…Correlation tests were used to validate the obtained model. Based on the proposed method, a small mean squared error value has been achieved in the validation phase. …”
Get full text
Get full text
Get full text
Article -
18
Optimisation of Environmental Risk Assessment Architecture using Artificial Intelligence Techniques
Published 2024“…Two methods were used to validate the proposed architecture, that is, the analytical method was used to validate the neuro-fuzzy risk assessment model and the safe path selection model, whereas the experimental method was used to evaluate the prototype. …”
thesis::doctoral thesis -
19
Taguchi?s T-method with Normalization-Based Binary Bat Algorithm
Published 2025“…Taguchi?s T-method (T-method) is a predictive modeling technique developed by Dr. …”
Conference paper -
20
Modeling, Testing and Experimental Validation of Laser Machining Micro Quality Response by Artificial Neural Network
Published 2009“…The model was then fed with new sets of machining parameters to experimentally validate the model’s ability in predicting the cut quality. …”
Get full text
Get full text
Article
