Showing 781 - 800 results of 1,490 for search '"ITER"', query time: 0.05s Refine Results
  1. 781

    UAV-based weed detection in Chinese cabbage using deep learning by Pauline Ong, Pauline Ong, Kiat Soon Teo, Kiat Soon Teo, Chee Kiong Sia, Chee Kiong Sia

    Published 2023
    “…The acquired images were preprocessed and subsequently segmented into the crop, soil, and weed classes using the Simple Linear Iterative Clustering Superpixel algorithm. The segmented images were then used to construct the CNN-based classifier. …”
    Get full text
    Article
  2. 782

    UAV-based weed detection in Chinese cabbage using deep learning by Pauline Ong, Pauline Ong, Kiat Soon Teo, Kiat Soon Teo, Chee Kiong Sia, Chee Kiong Sia

    Published 2023
    “…The acquired images were preprocessed and subsequently segmented into the crop, soil, and weed classes using the Simple Linear Iterative Clustering Superpixel algorithm. The segmented images were then used to construct the CNN-based classifier. …”
    Get full text
    Article
  3. 783

    UAV-based weed detection in Chinese cabbage using deep learning by Pauline Ong, Pauline Ong, Kiat Soon Teo, Kiat Soon Teo, Chee Kiong Sia, Chee Kiong Sia

    Published 2023
    “…The acquired images were preprocessed and subsequently segmented into the crop, soil, and weed classes using the Simple Linear Iterative Clustering Superpixel algorithm. The segmented images were then used to construct the CNN-based classifier. …”
    Get full text
    Article
  4. 784

    An improved parallel AGE method to solve incomplete blow-up problem through high performance computing system by Alias, Norma, Islam, Md. Rajibul, Muhamad, Nurul Ain Zhafarina, Satam, Noriza, Hamzah, Norhafiza

    Published 2010
    “…Four important terms that are, convergent rate by the number of iteration, execution time, computational complexity and stability are considered in this study to evaluate the performances of this approach.…”
    Get full text
    Article
  5. 785

    Crack growth analysis in reinforced concrete using BEM by Saleh, Abdul Latif, Aliabadi, MH

    Published 1998
    “…In using the boundary-element method to simulate cracks, the crack path is not known in advance because it can be calculated during the iteration process, and then the need of remeshing becomes obsolete. …”
    Get full text
    Article
  6. 786

    Use of base case Jacobians in power flow solution under topological changes by Ahmed, S. Shahnawaz, Rahman, Md. Mizanur

    Published 2002
    “…The present paper proposes the use of base case Jacobians without reinversion or refactorisation and reforming only the right side vector in each iteration. A comparative performance study between the proposed and the partial refactorisation techniques regarding their on-line CPU time requirements and solution accuracy has been made by conducting extensive simulation tests on a real power system for wider spectrum of practical cases involving topological changes.…”
    Article
  7. 787

    Modified reactive tabu search for the symmetric traveling salesman problems by Lim, Yai Fung, Hong, Pei Yee, Ramli, Razamin, Khalid, Ruzelan

    Published 2013
    “…In this paper, we proposed a modified RTS approach for solving symmetric traveling salesman problems (TSP).The tabu list size of the proposed algorithm depends on the number of iterations when the solutions do not override the aspiration level to achieve a good balance between diversification and intensification.The proposed algorithm was tested on seven chosen benchmarked problems of symmetric TSP.The performance of the proposed algorithm is compared with that of the TS by using empirical testing, benchmark solution and simple probabilistic analysis in order to validate the quality of solution. …”
    Get full text
    Conference or Workshop Item
  8. 788

    Interactive internet-based disaster risk information system for tsunami-hit Aceh province of Indonesia by Nasaruddin, Nasaruddin, Ardiansyah, Ardiansyah, Munadi, Khairul

    Published 2016
    “…This study proposes an interactive internet-based disaster risk management information system (DRMIS) for the Aceh province.The DRMIS serves as an online disaster risk map as well as a tool for communicating risk knowledge.An iterative approach to designing, developing and implementing the system is introduced.The DRMIS, which is currently accessible online, and its features, are described.The proposed system offers interactive display of four thematic maps, covering hazards, vulnerability, capacity and disaster risk of the most common natural hazards in Aceh.…”
    Get full text
    Article
  9. 789

    Signaling principles in interactive learning media through expert's walkthrough by Derlina, Derlina, Dalle, Juhriyansyah, Hadi, Sutarto, Abdul Mutalib, Ariffin, Sumantri, Candra

    Published 2018
    “…Thus, this paper aims to discuss the appropriate signaling principles for learning media from experts’ perspective. The Iterative Triangulation Methodology was applied to achieve the aim. …”
    Get full text
    Article
  10. 790

    Ant colony optimization algorithm for rule based classification: Issues and potential by Al-Behadili, Hayder Naser Khraibet, Ku-Mahamud, Ku Ruhana, Sagban, Rafid

    Published 2018
    “…ACO has gained importance because of its stochastic feature and iterative adaptation procedure based on positive feedback, both of which allow for the exploration of a large area of the search space. …”
    Get full text
    Article
  11. 791

    Logistic regression methods for classification of imbalanced data sets by Santi Puteri Rahayu, -

    Published 2012
    “…These results can be seen as further explanation on the success of Truncated Newton method in TR-KLR and TR Iteratively Re-weighted Least Square (TR-IRLS) algorithm respectively, because of the equivalence of iterative method used by these algorithms. …”
    Get full text
    Thesis
  12. 792
  13. 793

    Robust estimation technique and robust autocorrelation diagnostic for multiple Linear Regression Model with autocorrelated errors by Lim, Hock Ann

    Published 2014
    “…Cochrane-Orcutt Prais-Winsten (COPW) iterative method is the most commonly used remedial measure to rectify the autocorrelation problems. …”
    Get full text
    Thesis
  14. 794

    Development of DNA-based dynamic key-dependent block cipher by Saeed, Auday H.

    Published 2015
    “…The DNAB utilizes the DNA-based key-dependent components to enhance the security of cipher, and reduce the number of cipher-iterated rounds. Accordingly,for the substitution layer, the reality that the S-Boxes are unknown is one of the major strengths of the new cipher as the cryptanalysis requires known S-Boxes. …”
    Get full text
    Thesis
  15. 795

    Improving energy consumption in cloud computing datacenters using a combination of energy-aware resource allocation and scheduling mechanism by Khalil Abd., Sura

    Published 2017
    “…Therefore, using DNA based fuzzy genetic can obtain the best chromosomes in a few iterations to maximize utilization and minimize VM migration. …”
    Get full text
    Thesis
  16. 796

    Digital quadrature compensators scheme for analog imperfections of quadrature modulator in wireless communication systems by Talebpour, Faraz

    Published 2016
    “…The NMSE error is calculated for 128 numbers of iterations as well as 3% gain and °3 phase imbalance in QM. …”
    Get full text
    Thesis
  17. 797

    Adaptive kernel interpolation on 3D image reconstruction of breast ultrasound images by Ng, Paul Yong

    Published 2018
    “…The quantitative study of each technique are compared in terms of standard deviation, average absolute difference, iteration, time, kernel distribution. The proposed methods produced 80% of the kernel that distributed in the kernel size of 1 and 2 in nearest neighbour interpolation. …”
    Get full text
    Thesis
  18. 798

    Student courses management plan by Mohamad Azrul Amin, Mohamed Asof

    Published 2014
    “…During the development the system, the Iterative and Incremental Development model will be used as a guideline for the process phases. …”
    Get full text
    Undergraduates Project Papers
  19. 799

    Investigation of the Effects of Imputation Methods for Gene Regulatory Networks Modelling Using Dynamic Bayesian Networks by Sin, Yi Lim, Mohd Saberi, Mohamad, Lian, En Chai, Safaai, Deris, Weng, Howe Chan, Sigeru, Omatu, Muhammad Farhan, Sjaugi, Muhammad Mahfuz, Zainuddin, Gopinathaan, Rajamohan, Zuwairie, Ibrahim, Zulkifli, Md. Yusof

    Published 2016
    “…Three missing value imputation methods are used, which are k-Nearest Neighbor (kNN), Iterated Local Least Squares (ILLsimpute), and Fixed Rank Approximation Algorithm (FRAA). …”
    Get full text
    Book Chapter
  20. 800

    Using normalized simultaneous perturbation stochastic approximation for stable convergence in model-free control scheme by Mohd Ashraf, Ahmad, Low, Kok Hin, Ahmad Nor Kasruddin, Nasir, Mohd Zaidi, Mohd Tumari, Raja Mohd Taufika, Raja Ismail, Zuwairie, Ibrahim

    Published 2018
    “…To be more specific, each measurement of the objective function from the perturbations is normalized to the maximum objective function measurement at the current iteration. As a result, this improvement is expected to avoid the updated control parameter from producing an unstable control performance. …”
    Get full text
    Conference or Workshop Item