Search Results - (( model validation process algorithm ) OR ( _ communication a algorithm ))

Refine Results
  1. 1

    Widely linear dynamic quaternion valued least mean square algorithm for linear filtering by Mohammed, Aldulaimi Haydar Imad

    Published 2017
    “…A superior performance is achieved by the proposed algorithms in system modeling where the DQLMS was able to track the correct weights values of the different modeled systems 430 sample faster than the QLMS and ZA-QLMS algorithms while the WL-DQLMS was faster than the WLQLMS algorithm by 950 samples. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Design of Modeling Elements of Luoshan Shadow Puppets Creative Goods Based on Deep Learning by Taotao, Xu, Musdi, Shanat, Brendan Chan, Kah Le, Wei, Zhang

    Published 2023
    “…The validity and reliability of the method in this paper are effectively verified by the test, which provides a reliable and efficient method for the design of modeling elements of Luoshan shadow puppet creative goods.…”
    Get full text
    Get full text
    Get full text
    Proceeding
  3. 3

    Analysing machine learning models to detect disaster events using social media by Faris Azni Azlan, Mr.

    Published 2023
    “…To simulate the examining process further, a fuzzy algorithm is developed to automatically rate the severity of a disaster as described in each message in disaster environment. …”
    text::Thesis
  4. 4
  5. 5
  6. 6

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…In this paper, the limitation of Token Ring algorithm for IP networks in the context of intelligent processing has been researched extensively. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9
  10. 10

    ECG encryption enhancement with multi-layers of AES and DNA computing by Kh-Madhloom, Jamal

    Published 2023
    “…MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Brewing perfection: real-time monitoring of arabic coffee using iot and machine learning by Abuzaraida, Mustafa Ali, A. L. gaud, Sarah, Abrahim Hneish, Hamza, Attarbashi, Zainab

    Published 2026
    “…A comprehensive dataset of 70 videos of the coffee preparation process was collected, resulting in the extraction of 834 images that were divided into training and validation sets. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio... by Daba, Layth Muwafaq Abdulhussein

    Published 2023
    “…VL-WIDE has accomplished a higher median value for the domination over state-of-the-art algorithms with a higher number of non- dominated solutions value than all other benchmarks. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Innovative smart phone learning system for graphical systems within covid-19 pandemic by Tawafak R.M., Alfarsi G., Jabbar J.

    Published 2023
    “…This paper used the Technology Acceptance Model (TAM) as an m-learning model, and Bresenham�s line algorithm is a calculation system implemented by applications. …”
    Article
  15. 15

    Predicting motorcycle customization preferences using machine learning by Saputra, Ananta, Utoro, Rio Korio, Roedavan, Rickman, Soegiarto, Duddy, Moorthy, Kohbalan, Pratondo, Agus

    Published 2025
    “…Random forest was chosen in this research as a primary algorithm because it is superior and its efficiency in processing heterogeneous data. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Bayesian Network Classifiers for Damage Detection in Engineering Material by Mohamed Addin, Addin Osman

    Published 2007
    “…The methodology used in the thesis to implement the Bayesian network for the damage detection provides a preliminary analysis used in proposing a novel fea- ture extraction algorithm (f-FFE: the f-folds feature extraction algorithm). …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Foreground segmentation-based human detection with shadow removal by Hafiz, Fadhlan, Shafie, Amir Akramin, Khalifa, Othman Omran, Ali, Md. Hazrat

    Published 2010
    “…The proposed detection technique will first try to extract all foreground objects from the background and then moving shadows will be eliminated by a shadow detection algorithm. Finally, we perform a morphological reconstruction algorithm to recover the distorted foreground objects after shadow removal process. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    A single measurement of combined Direct and indirect MPPT algorithm for mismatch PV module application / Mohd Najib Mohd Hussain by Mohd Hussain, Mohd Najib

    Published 2016
    “…The system is constructed from model-based design (MBD) of the PV system. The MBD is divided into four parts; executable system properties, design and simulation of the properties, execution and implementation for code generation and verification process. …”
    Get full text
    Get full text
    Thesis
  20. 20

    High-throughput and energy-efficient Contiki MAC layer scheme in IEEE 802.15.4 for structural health monitoring by Al-Mekhlafi, Mohamed Abdulkarem Taher

    Published 2021
    “…Finally, a case study of a WSN-based SHM system using developed embedded data filtering and transmission algorithms to reduce data communication is performed and taken place on a concrete beam at Civil Engineering Structure Laboratory, UPM. …”
    Get full text
    Get full text
    Thesis