Search Results - (( model validation method algorithm ) OR ( user identification _ algorithm ))*

Refine Results
  1. 1

    Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model by Yaacob, Mohd. Shafiek, Jamaluddin, Hishamuddin

    Published 2001
    “…The correlation based model validity tests are used to validate the identified fuzzy model.…”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    A graphical user interface application for continuous-time identification of dynamical system by Rahmat, Mohd. Fua'ad, Omar, Rosli, Jamaluddin, Hishamuddin

    Published 2002
    “…This paper introduces a Graphical User Interface (GUI) application in system identification and parameter estimation of dynamic systems using Generalized Poisson Moment Functionals (GPMF) method based on Instrumental Variable (IV) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper by Yahya, Zahrah

    Published 2016
    “…The algorithm is validated by conducting manual ground truth and the results were compared with the closest and well-known methods. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Self-calibration algorithm for a pressure sensor with a real-time approach based on an artificial neural network by M. Almassri, Ahmed M., Wan Hasan, Wan Zuha, Ahmad, Siti Anom, Shafie, Suhaidi, Wada, Chikamune, Horio, Keiichi

    Published 2018
    “…To verify the proposed model’s capability to build a self-calibration algorithm, the model was tested using an untrained input data set. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Real time self-calibration algorithm of pressure sensor for robotic hand glove system by Almassri, Ahmed M. M.

    Published 2019
    “…The model was tested using an untrained input data set in order to verify the Proposed model’s capability for implementing a self-calibration algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Identification of non-equilibrium growth for bitcoin exchange rate: mathematical derivation method in Islamic financial engineering by Rosbi, Sofian, Abu Bakar, Nashirah

    Published 2017
    “…Crptocurrency is a type of digital currency that using decentralized method for validating transaction. In the same time, the user of the Bitcoin is protected using hash algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Digital video broadcasting satellite-based passive forward scatter radar for drone detection based on micro Doppler analysis by Musa, Surajo Alhaji

    Published 2019
    “…An empirical mode decomposition (EMD) algorithm was then used to extract the feature vectors present in the acquired signature. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Effective predicate identification algorithm for XML retrieval by Roko, Abubakar, C. Doraisamy, Shyamala, Nakone, Bello

    Published 2018
    “…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Analysis of Online Social Network Connections for Identification of Influential Users by Al-Garadi, Mohammed Ali, Varathan, Kasturi Dewi, Ravana, Sri Devi, Ahmed, Ejaz, Mujtaba, Ghulam, Khan, Muhammad Usman Shahid, Khan, Samee U.

    Published 2018
    “…This article presents a detailed survey of influential usersidentification algorithms and their performance evaluation approaches in OSNs. …”
    Get full text
    Get full text
    Article
  11. 11

    Analysis of Toothbrush Rig Parameter Estimation Using Different Model Orders in Real Coded Genetic Algorithm (RCGA) by Ainul, H. M. Y., Salleh, S. M., Halib, N., Taib, H., Fathi, M. S.

    Published 2024
    “…The validation test-through correlation analysis was used to validate the model. …”
    Article
  12. 12

    Analysis of toothbrush rig parameter estimation using different model orders in Real-Coded Genetic Algorithm (RCGA) by Ainul, H. M. Y., Salleh, S. M., Halib, N., Taib, H., Fathi, M. S.

    Published 2018
    “…The validation test-through correlation analysis was used to validate the model. …”
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Development of person identification application for video surveillance by Soon, Phaik Ching

    Published 2022
    “…The information of the tracker is necessary for person identification. Third, person identification implemented the CNN model for training. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Dynamic modelling of a flexible beam structure using feedforward neural networks for active vibration control by Tuan Abdul Rahman, Tuan Ahmad Zahidi, As'arry, Azizan, Abdul Jalil, Nawal Aswan, Raja Ahmad, Raja Mohd Kamil

    Published 2019
    “…Correlation tests were used to validate the obtained model. Based on the proposed method, a small mean squared error value has been achieved in the validation phase. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Optimisation of Environmental Risk Assessment Architecture using Artificial Intelligence Techniques by Salem S. M. Khalifa

    Published 2024
    “…Two methods were used to validate the proposed architecture, that is, the analytical method was used to validate the neuro-fuzzy risk assessment model and the safe path selection model, whereas the experimental method was used to evaluate the prototype. …”
    thesis::doctoral thesis
  19. 19

    Taguchi?s T-method with Normalization-Based Binary Bat Algorithm by Marlan Z.M., Jamaludin K.R., Harudin N.

    Published 2025
    “…Taguchi?s T-method (T-method) is a predictive modeling technique developed by Dr. …”
    Conference paper
  20. 20

    Modeling, Testing and Experimental Validation of Laser Machining Micro Quality Response by Artificial Neural Network by Sivarao, Subramonian

    Published 2009
    “…The model was then fed with new sets of machining parameters to experimentally validate the model’s ability in predicting the cut quality. …”
    Get full text
    Get full text
    Article