Search Results - (( using factor method algorithm ) OR ( using identification using algorithm ))
Search alternatives:
- using identification »
- identification using »
- method algorithm »
- using algorithm »
- using factor »
-
1
Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification
Published 2007“…The genetic algorithm approach is widely recognized as an effective and flexible optimization method for system identification. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Comparison of algorithm Support Vector Machine and C4.5 for identification of pests and diseases in chili plants
Published 2019“…The use of data mining algorithms is expected to help in the identification of pests and diseases in chili plants. …”
Get full text
Get full text
Conference or Workshop Item -
3
-
4
Wood texture detection with conjugate gradient neural network algorithm
Published 2017“…The experiments are based on artificial neural network (ANN) algorithm that used back propagation and conjugate gradient method of training function in the process of identification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Investigating optimal smartphone placement for identifying stairs movement using machine learning
Published 2023“…It was observed that, by using the Decision Tree and Random Forest algorithm 100% accuracy was achieved, when the smartphone was placed at the thigh during stair movement. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article -
7
Development of fault detection, diagnosis and control system identification using multivariate statistical process control (MSPC)
Published 2006“…In this research work, an FDD algorithm is developed using MSPC and correlation coefficients between process variables. …”
Get full text
Get full text
Monograph -
8
An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif
Published 2016“…Soft computing techniques, such as bio-inspired algorithms, can be used for information processing by employing methods which are capable to deal with imprecision and uncertainty. …”
Get full text
Get full text
Research Reports -
9
-
10
Smote and OVO multiclass method for multiple handheld placement gait identification on smartphone’s accelerometer
Published 2017“…At the same time, using SMOTE and OVO methods do increase the accuracy of the gait identification.…”
Get full text
Get full text
Get full text
Article -
11
A modified π rough k-means algorithm for web page recommendation system
Published 2018“…In data preparation stage, the quality of prepared data is measured by Local Outlier Factor (LOF) method. The experimental results revealed that the degree of user sessions outliers reduced than the previous method while in pattern discovery stage, the results of user sessions partition with the modified πRKM algorithm are measured by the Davies Bouldin Index (DBI). …”
Get full text
Get full text
Get full text
Thesis -
12
CAT CHAOTIC GENETIC ALGORITHM BASED TECHNIQUE AND HARDWARE PROTOTYPE FOR SHORT TERM ELECTRICAL LOAD FORECASTING
Published 2017“…ANN based STLF models commonly use back-propagation algorithm, which generally exhibits a slow and improper convergence that affects the forecast accuracy. …”
Get full text
Get full text
Thesis -
13
Survival versus non-survival prediction after acute coronary syndrome in Malaysian population using machine learning technique / Nanyonga Aziida
Published 2019“…Prediction, identification, understanding and visualization of relationship between factors affecting mortality in ACS patients using feature selection and ML algorithms. …”
Get full text
Get full text
Get full text
Thesis -
14
Risk assessment for safety and health algorithm for building construction in Oman
Published 2015“…Then, 40 safety and health specialists were involved in carrying out a risk assessment using the existing method of risk analysis (RA) and the new proposed method of RASH. …”
Get full text
Get full text
Thesis -
15
SOMEA: self-organizing map based extraction algorithm for DNA motif identification with heterogeneous model
Published 2011“…The intra-node competition is based on an adaptive weighting technique on two different signal models to better represent these two classes of signals. Using several real and artificial datasets, we compared our proposed method with several motif discovery tools. …”
Get full text
Get full text
Get full text
Article -
16
System identification of essential oil extraction system using non-linear autoregressive model with exogenous inputs (NARX) / Farahida Awadz
Published 2010“…The QR factorization is used to estimate the parameters of the reduced regressor matrix. …”
Get full text
Get full text
Thesis -
17
Parametric modelling of a TRMS using dynamic spread factor particle swarm optimisation
Published 2009“…The proposed method formulates a modified inertia weight algorithm by using a dynamic spread factor (SF). …”
Get full text
Get full text
Get full text
Proceeding Paper -
18
Cluster identification and separation in the growing self-organizing map: Application in protein sequence classification
Published 2010“…We used simple k-means algorithm as a method to identify clusters in the GSOM. …”
Get full text
Get full text
Get full text
Article -
19
Kalman filter based impedance parameter estimation for transmission line and distribution line
Published 2019“…Then, the data set values such as voltage, current and power factor are used to estimates the new values of RXB and RLC parameters. …”
Get full text
Get full text
Thesis -
20
Localization using fingerprint method in emergency situation for indoor navigation system / Felix Ceilomond Samam
Published 2015“…The method used is the collection of data using Wi-Fi fingerprint Apps on smartphone. …”
Get full text
Get full text
Thesis
