Search Results - (( probable evaluation method algorithm ) OR ( a deviations methods algorithm ))

Refine Results
  1. 1

    Development of a new robust hybrid automata algorithm based on surface electromyography (SEMG) signal for instrumented wheelchair control by Mohd Hanafi, Muhammad Sidik

    Published 2020
    “…This method would be a control method to activate power assist system and selected based on conditions set in the algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    GENETIC FUZZY FILTER BASED ON MAD AND ROAD TO REMOVE MIXED IMPULSE NOISE by JANAH, NUR ZAHRATI

    Published 2010
    “…It also surpasses the other methods, either classical or soft computing-based approaches to impulse noise removal, in MAE and PSNR evaluations. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Optimal planning of photovoltaic distributed generation considering uncertainties using monte carlo pdf embedded MVMO-SH by Norhafidzah, Mohd Saad

    Published 2021
    “…A hybrid population – based stochastic optimization method named MVMO-SH algorithm is proposed to optimize PVDG locations and sizes in the grid system network. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Acoustic Performance Study Of 3d Printed Micro-Perforated Panel by Kamarulzaman, Muhammad Amir

    Published 2021
    “…The capture images were processed in graph-cut image segmentation algorithm. The circularity of each hole is measured using the processed images and evaluated based on the probability outcomes of specified circularities. …”
    Get full text
    Get full text
    Monograph
  5. 5

    Crossover and mutation operators of real coded genetic algorithms for global optimization problems by Lim, Siew Mooi

    Published 2016
    “…The explorative and exploitative features of the proposed GA are regulated by substantial crossover probability and mutation rate set up using the Taguchi method. …”
    Get full text
    Get full text
    Thesis
  6. 6

    An enhanced sequential exception technique for semantic-based text anomaly detection by Taiye, Mohammed Ahmed

    Published 2019
    “…Text anomaly detection identifies deviating information from general information contained in documents. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Time-Uncertainty Analysis by Using Simulation in Project Scheduling Networks by Mohammed Omer, Anwar

    Published 1999
    “…Risk analysis is primarily concerned with evaluating uncertainties. The purpose of risk analysis is to enable a decision-maker to take an appropriate response in advance against a possible occurrence of a problem. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Perturbation stochastic model updating of a bolted structure / Mohamad Azam Shah Aziz Shah by Aziz Shah, Mohamad Azam Shah

    Published 2022
    “…The scheme was developed by introducing a multidimensional analysis consisting of a systematic quasi-random sampling algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Tree-based contrast subspace mining method by Florence Sia Fui Sze

    Published 2020
    “…Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Analysis of tumour control probability, normal tissue complication probability and isotoxic effects for prostate cancer by Fauzee, Nurnada Syahrain Mohd

    Published 2016
    “…Variation in evaluation method will not give similar findings even same data is used. …”
    Get full text
    Get full text
    Monograph
  11. 11

    Modified Contrast Limited Adaptive Histogram Equalization for high dynamic range images by Tung, Li Qian

    Published 2012
    “…The generated probability map of the proposed tone mapped algorithm was then compared with the generated probability map of Ward tone mapping algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    The effect of dose calculation algorithms on the normal tissue complication probability values of thoracic cancer by Ahmad, Noor Ashikin

    Published 2015
    “…Four treatment plans are created and DVHs are evaluated based on criteria of acceptance level. NTCP values for thorax plan one and two are evaluated by using different algorithm. …”
    Get full text
    Get full text
    Monograph
  13. 13
  14. 14

    Real-Time Optimal Trajectory Correction (ROTC) for autonomous quadrotor / Noorfadzli Abdul Razak by Abdul Razak, Noorfadzli

    Published 2018
    “…There are two stages implicated in the algorithm. First stage comprises a deviation scheme used to sense a deviation via an accelerometer and formulates a vector by applying double integration techniques fused with Kalman’s Filter (KF). …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17
  18. 18

    Spam image filtering algorithm / Muhammad Hazim Shahimi by Shahimi, Muhammad Hazim

    Published 2015
    “…This project applied Optical Character Recognition (OCR) and Bayesian probability to filter the spam images. The evaluation task is done by using formula of Precision, Recall, Error Rate, and Accuracy. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Microcrack Detection And Noise Reduction In Integrated Circuit Packages by Koh, Ye Sheng

    Published 2018
    “…Three algorithms are tested and evaluated in terms of microcrack detection and noise reduction which are probability based thresholding, histogram equalization, and modified Perona-Malik’s anisotropic diffusion methods. …”
    Get full text
    Get full text
    Monograph
  20. 20

    Efficient management of Top-k queries over Uncertain Data Streams with dynamic Sliding Window Model by Raja Wahab, Raja Azhan Syah

    Published 2024
    “…The experiments in this study compare the SWMTop-kDelta algorithm with two previous researchers and two baseline approach algorithms to evaluate their effectiveness. …”
    Get full text
    Get full text
    Get full text
    Thesis