Search Results - (( new evaluation tool algorithm ) OR ( identification _ based algorithm ))

Refine Results
  1. 1

    Identification of non-linear dynamic systems using fuzzy system with constrained membership functions by Yaakob, Mohd. Shafiek

    Published 2004
    “…Main research directions in this field include the complexity reduction of fuzzy models models, structure identification of fuzzy system, and application of new or improved training algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper by Yahya, Zahrah

    Published 2016
    “…The results of the validation show a complete similarity between each original face and the output from our algorithm. Furthermore, the algorithm is also evaluated by human experts and shows 100% correctness.…”
    Get full text
    Get full text
    Thesis
  3. 3

    Comparative Study of Weighted Product–Dijkstra’s Algorithm and All Possible Path Approach Based on Multiple Criteria and Multi-Dimensions by Ting Kien Hua, Noraini Abdullah

    Published 2020
    “…Weighted product method was one of the algorithms in Multi-Criteria Decision Making (MCDM) that was used to combine multiple criteria into new scores for further evaluation. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Hybrid genetic random forest algorithm for the identification of ISI-indexed articles / Mohammadreza Moohebat by Mohammadreza, Moohebat

    Published 2017
    “…In order to measure performance of the proposed algorithm, evaluation was done by several independent UCI datasets and the results were compared with RF and some individual classifiers. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Reassembly and clustering bifragmented intertwined jpeg images using genetic algorithm and extreme learning machine by Raad Ali, Rabei

    Published 2019
    “…It is applied to three datasets namely DFRWS (2006 and 2007) forensic challenges datasets and a new dataset to test and evaluate the AJC tool. These datasets have complex challenges that simulate particular fragmentation cases addressed in this research. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    A security payment model for financial payment using mykad by Ahmad Zahari, Nurul Huda

    Published 2011
    “…However, if attack or intrusion is detected in less than 30 minutes, ARSA will automatically change the security algorithm to a new one. The evaluation of the MPM performance is measured with HP LoadRunner testing tools from which it is found that the response time of MPM with multithreading is better compared to the single thread model and credit card authorisation system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Software-Defined Radio-Based Modulation and Demodulation Scheme by Bakhraiba, Ahmed Mohamed Salih

    Published 2009
    “…Software Defined Radio (SDR) has been one of the new techniques developed to change the way the traditional wireless communication systems work. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Bottleneck-based heuristic for permutation flowshop scheduling by Isa, Noor Amira

    Published 2017
    “…The heuristic performance was evaluated based on the average makespan ratio, average percentage error, and percentage of solution performance obtained. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Autonomous self-exam monitoring for early diabetes detection by Rohana, Abdul Karim, Nur Alia Fatiha, Azhar, Nurul Wahidah, Arshad, Nor Farizan, Zakaria, M. Zabri, Abu Bakar

    Published 2020
    “…This project comprises of three stages which are pre-processing, processing and post processing stage. The designed tool convert an iris image into new picture using image processing algorithms and analyses some changes in colour pattern and lastly diagnose whether it is diabetic or non-diabetic iris. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    The conceptual framework of knowledge of large scale and incomplete graphs of skyline queries optimization using machine learning by Noor, Ubair, Hassan, Raini, Dwi Handayani, Dini Oktarina

    Published 2025
    “…The preliminary results using the K means Clustering Algorithm showed that the conceptual framework successfully grouped similar data points, facilitating the identification of skyline points. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji by Muhammad Illyas, Abdul Muhji

    Published 2018
    “…Then the new rotation angle is used to detect bleeding in the patient and evaluate the performance of the new algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Recursive Subspace Identification Algorithm Using The Propagator Based Method by Jamaludin, Irma Wani, Abdul Wahab, Norhaliza

    Published 2017
    “…In this paper, the recursive subspace identification algorithm based on the propagator method which avoids the SVD computation is proposed. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Low-level hybridization scripting language with dynamic parameterization in PSO-GA / Suraya Masrom by Masrom, Suraya

    Published 2015
    “…In the scripting language evaluation, nine LLHs and three single PSO algorithms have been successfully created using the scripting languages. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Hybrid DE-PEM algorithm for identification of UAV helicopter by Tijani, Ismaila, Akmeliawati, Rini, Legowo, Ari, Budiyono, Agus, Abdul Muthalif, Asan Gani

    Published 2014
    “…Practical implications – The identification algorithm is expected to facilitate the required model development for model-based control design for autonomous helicopter development. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Smoothed functional algorithm with norm-limited update vector for identification of continuous-time fractional-order Hammerstein Models by Mok, Ren Hao, Mohd Ashraf, Ahmad

    Published 2024
    “…In particular, the standard smoothed functional algorithm (SFA) based method is modified by implementing a limit function in the update vector of the standard SFA based method to solve the issue of high tendency of divergence during the identification process. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification by Abd Samad, Md Fahmi

    Published 2011
    “…A deterministic mutation-based algorithm is introduced to overcome this problem. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    A new fuzzy peer assessment methodology for cooperative learning of students by Tay, Kai Meng, Kok, Chin Chai, Chee, Peng Lim

    Published 2015
    “…The outcomes clearly demonstrate that the proposed fuzzy peer assessment methodology can be deployed as an effective evaluation tool for cooperative learning of students.…”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Identification of continuous-time hammerstein system using sine cosine algorithm by E. F., Junis, J. J., Jui, Mohd Helmi, Suid, Mohd Ashraf, Ahmad

    Published 2019
    “…This paper presents the development of identification of continuous-time Hammerstein systems based on Sine Cosine Algorithm (SCA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item