Search Results - (( model validation process algorithm ) OR ( _ communication a algorithm ))
Search alternatives:
- validation process »
- process algorithm »
- model validation »
- _ communication »
- communication a »
- a algorithm »
-
1
Widely linear dynamic quaternion valued least mean square algorithm for linear filtering
Published 2017“…A superior performance is achieved by the proposed algorithms in system modeling where the DQLMS was able to track the correct weights values of the different modeled systems 430 sample faster than the QLMS and ZA-QLMS algorithms while the WL-DQLMS was faster than the WLQLMS algorithm by 950 samples. …”
Get full text
Get full text
Get full text
Thesis -
2
Design of Modeling Elements of Luoshan Shadow Puppets Creative Goods Based on Deep Learning
Published 2023“…The validity and reliability of the method in this paper are effectively verified by the test, which provides a reliable and efficient method for the design of modeling elements of Luoshan shadow puppet creative goods.…”
Get full text
Get full text
Get full text
Proceeding -
3
Analysing machine learning models to detect disaster events using social media
Published 2023“…To simulate the examining process further, a fuzzy algorithm is developed to automatically rate the severity of a disaster as described in each message in disaster environment. …”
text::Thesis -
4
Text spam messages classification using Artificial Immune System (AIS) algorithms
Published 2024thesis::master thesis -
5
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
6
Cohesive token passing algorithm utilizing software agents
Published 2010“…In this paper, the limitation of Token Ring algorithm for IP networks in the context of intelligent processing has been researched extensively. …”
Get full text
Get full text
Article -
7
-
8
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
9
Water wave optimization with deep learning driven smart grid stability prediction
Published 2022“…In order to validate the enhanced performance of the proposed WWOODL-SGSP model, a wide range of experimental analyses…”
Get full text
Get full text
Get full text
Article -
10
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. …”
Get full text
Get full text
Get full text
Thesis -
11
Brewing perfection: real-time monitoring of arabic coffee using iot and machine learning
Published 2026“…A comprehensive dataset of 70 videos of the coffee preparation process was collected, resulting in the extraction of 834 images that were divided into training and validation sets. …”
Get full text
Get full text
Get full text
Proceeding Paper -
12
Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio...
Published 2023“…VL-WIDE has accomplished a higher median value for the domination over state-of-the-art algorithms with a higher number of non- dominated solutions value than all other benchmarks. …”
Get full text
Get full text
Thesis -
13
Augmented reality monitoring system for cross-belt conveyor in advanced automation line / Sukarnur Che Abdullah ... [et al.]
Published 2025“…The algorithm's efficacy was validated through its application to a basic material handling process, specifically a barcode sorting conveyor. …”
Get full text
Get full text
Get full text
Article -
14
Innovative smart phone learning system for graphical systems within covid-19 pandemic
Published 2023“…This paper used the Technology Acceptance Model (TAM) as an m-learning model, and Bresenham�s line algorithm is a calculation system implemented by applications. …”
Article -
15
Predicting motorcycle customization preferences using machine learning
Published 2025“…Random forest was chosen in this research as a primary algorithm because it is superior and its efficiency in processing heterogeneous data. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Bayesian Network Classifiers for Damage Detection in Engineering Material
Published 2007“…The methodology used in the thesis to implement the Bayesian network for the damage detection provides a preliminary analysis used in proposing a novel fea- ture extraction algorithm (f-FFE: the f-folds feature extraction algorithm). …”
Get full text
Get full text
Thesis -
17
-
18
Foreground segmentation-based human detection with shadow removal
Published 2010“…The proposed detection technique will first try to extract all foreground objects from the background and then moving shadows will be eliminated by a shadow detection algorithm. Finally, we perform a morphological reconstruction algorithm to recover the distorted foreground objects after shadow removal process. …”
Get full text
Get full text
Get full text
Proceeding Paper -
19
A single measurement of combined Direct and indirect MPPT algorithm for mismatch PV module application / Mohd Najib Mohd Hussain
Published 2016“…The system is constructed from model-based design (MBD) of the PV system. The MBD is divided into four parts; executable system properties, design and simulation of the properties, execution and implementation for code generation and verification process. …”
Get full text
Get full text
Thesis -
20
High-throughput and energy-efficient Contiki MAC layer scheme in IEEE 802.15.4 for structural health monitoring
Published 2021“…Finally, a case study of a WSN-based SHM system using developed embedded data filtering and transmission algorithms to reduce data communication is performed and taken place on a concrete beam at Civil Engineering Structure Laboratory, UPM. …”
Get full text
Get full text
Thesis
