Search Results - (( model validation using algorithm ) OR ( time information systems algorithm ))*

Refine Results
  1. 1

    Mathematical modelling of mass transfer in a multi-stage rotating disc contactor column by Maan, Normah

    Published 2005
    “…This system serves as the basis for the inverse models of the mass transfer process in which fuzzy approach was used in solving the problems. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Discrete-time system identification using genetic algorithm with single parent-based mating technique by Zainuddin, Farah Ayiesya

    Published 2024
    “…System identifiction (SI) is a methodology for developing mathematical models of dynamic systems using measurements of input and output signals. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm by Abu Samah, Khyrina Airin Fariza

    Published 2016
    “…Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    NARX modelling for steam distillation pilot plant using binary particle swarm optimisation technique / Najidah Hambali by Hambali, Najidah

    Published 2019
    “…This study proposes a system identification of SDPP using NARX model. The model structure selection of polynomial NARX had been focused on Binary Particle Swarm Optimisation (BPSO) algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK by MOHAMED AHMED ELSHEIK, MUNA ELSADIG

    Published 2011
    “…New benchmarking metrics for detection capabilities, prevention predictability trust and self-healing reliability are introduced as contributions for the IPS and SH system measuring and validation. Using the software system, design theories, AIS features, new nonlinear classification algorithm, and self-healing system show how the use of presented systems can ensure safety for critical services networks and heal the damage caused by intrusion. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    Intent-IQ: customer’s reviews intent recognition using random forest algorithm by Mazlan, Nur Farahnisrin, Ibrahim Teo, Noor Hasimah

    Published 2025
    “…Two machine learning model is chosen to build the classification models which are Random Forest (RF) algorithm and Multinomial Naïve Bayes (MNB) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Abnormal data detection model based on autoencoder and random forest algorithm: camera sensor data in autonomous driving systems by Shengwen, Geng, Osman, Mohd Hafeez

    Published 2025
    “…The key performance indicators such as accuracy, precision, recall, and F1 score are used to evaluate the model, and the robustness is guaranteed by cross-validation. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Effort Estimation Model for Function Point Measurement by Koh, Tieng Wei

    Published 2007
    “…The total of 2265 historical business information systems collected by International Software Benchmarking Standard Groups (ISBSG) has been used to generate and validate the model using statistical technique, known as linear regression analysis. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Q-learning based vertical handover decision algorithm in LTE-A two-tier macrocell-femtocell systems / Ammar Bathich by Bathich, Ammar

    Published 2019
    “…The proposed handover algorithms are validated using the LTE-Sim simulator under an urban environment. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Power System State Estimation In Large-Scale Networks by NURSYARIZAL MOHD NOR, NURSYARIZAL

    Published 2010
    “…The gain and the Jacobian matrices associated with the basic algorithm require large storage and have to be evaluated at every iteration, resulting in more computation time. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Resource allocation technique for powerline network using a modified shuffled frog-leaping algorithm by Altrad, Abdallah Mahmoud Mousa

    Published 2018
    “…The main goal of this work is to develop a conceptual framework and mathematical model for resource allocation using Shuffled Frog-Leap Algorithm (SFLA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Intelligent image noise types recognition and denoising system using deep learning / Khaw Hui Ying by Khaw , Hui Ying

    Published 2019
    “…The designed system is validated by using images treated with noise of single and combination of various types. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Penilaian esei berbantukan komputer menggunakan teknik Bayesian dan pengunduran linear berganda by Mohamad @ Hamza, Mohd. Azwan

    Published 2006
    “…Recently, Fuzzy Logic is used to determine and classify the discourse element while Stepwise Linear Regression Algorithm (SLR) is used to make closest prediction for style of writing. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Join query enhancement processing (jqpro) with big rdf data on a distributed system using hashing-merge join technique by Nahla Mohammedelzein, Elawad Babiker

    Published 2021
    “…On the other hand, the throughput was employed to measure the units of information that a system can process in each time frame. …”
    Get full text
    Get full text
    Thesis