Search Results - (( _ evaluation cell algorithm ) OR ( based information based algorithm ))

Refine Results
  1. 1

    Validation on an enhanced dendrite cell algorithm using statistical analysis by Mohamad Mohsin, Mohamad Farhan, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Abd Wahab, Mohd Helmy

    Published 2017
    “…In this study, we evaluated the performance of the enhanced algorithm called dendrite cell algorithm using sensitivity, specificity, false positive rate, and accuracy and validated the result using parametric and non parametric statistical significant tests. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Q-learning based vertical handover decision algorithm in LTE-A two-tier macrocell-femtocell systems / Ammar Bathich by Bathich, Ammar

    Published 2019
    “…New multi-criterion handover decision parameters are proposed in typical/dense femtocells in macrocells environment to estimate the target cell for handover. The proposed handover algorithms are validated using the LTE-Sim simulator under an urban environment. …”
    Get full text
    Get full text
    Thesis
  3. 3

    On spectral efficiency maximization in a partial joint processing system using a multi-start particle swarm optimization algorithm by Faisal, Ali Raed, Hashim, Fazirulhisyam, Ismail, Mahamod, Noordin, Nor Kamariah

    Published 2015
    “…However, achieving equivalent backhaul reduction based on limited feedback channel state information is challenging when linear techniques, such as zero-forcing beamforming (BF) are used, which led to the use of stochastic algorithms instead. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    A comprehensive overview of classical and modern route planning algorithms for self-driving mobile robots by Wan Daud, Wan Mohd Bukhari, Abu, Nur Syuhadah, Omar, Siti Nashayu, Sohaimeh, Shahirul Ashraf, Adli,, M. H.

    Published 2022
    “…Classical or traditional methods, such as Roadmaps (Visibility Graph and Voronoi Diagram), Potential Fields, and Cell Decomposition, and modern methodologies such as heuristic-based (Dijkstra Method, A* Algorithms, and D* Algorithms), metaheuristics algorithms (such as PSO, Bat Algorithm, ACO, and Genetic Algorithm), and neural systems such as fuzzy neural networks or fuzzy logic (FL) and Artificial Neural Networks (ANN) are described in this report. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    WCDMA forward link capacity improvement by using adaptive antenna with genetic algorithm assisted MDPC beamforming technique by Kiong T.S., Ismail M., Hassan A.

    Published 2023
    “…A dynamic radio network simulator was developed in Visual C++� to study the power consumption at Node B and estimate the downlink capacity improvement by implementing this novel algorithm. Simulation was done based on single micro cell environment with considering interference from the first tier. …”
    Article
  6. 6

    WCDMA forward link capacity improvement by using adaptive antenna with genetic algorithm assisted MDPC beamforming technique by Tiong, Sieh Keong, Ismail, Mahamod, Hassan, Azmi

    Published 2006
    “…A dynamic radio network simulator was developed in Visual C++® to study the power consumption at Node B and estimate the downlink capacity improvement by implementing this novel algorithm. Simulation was done based on single micro cell environment with considering interference from the first tier. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Lung cancer medical images classification using hybrid CNN-SVM by Abdulrazak Yahya, Saleh, Chee, Ka Chin, Vanessa, Penshie, Hamada Rasheed Hassan, Al-Absi

    Published 2021
    “…In this study, the performance of this algorithm is evaluated, and the results indicated that our proposed CNN-SVM algorithm has been succeed in classifying lung images with 97.91% accuracy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    On iterative low-complexity algorithm for optimal antenna selection and joint transmit power allocation under impact pilot contamination in downlink 5g massive MIMO systems by Mohammed Ahmed, Adeeb Ali

    Published 2020
    “…In conclusion, the proposed low-complexity iterative algorithm can be used to maximize the EE based on the maximum transmit power , where the noise power is less than the power of the received pilot sequence.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Internet utility evaluation of a multi-start particle swarm optimization beamformer in a partial joint processing cellular network by Faisal, Ali Raed, Hashim, Fazirulhisyam, Ismail, Mahamod, Noordin, Nor Kamariah

    Published 2016
    “…Unlike linear techniques such as zero-forcing (ZF), achieving an equivalent backhaul reduction and presenting a totally free ICI system based on limited feedback channel state information can be done by designing and implementing a multi-start particle swarm optimization algorithm (MSPSOA) as a beamforming (BF) mechanism. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Mining and integration of oral cancer genomics for predictive therapeutics / Bernard Lee Kok Bang by Bernard Lee, Kok Bang

    Published 2019
    “…Later, antiproliferative experiments confirmed the efficacy of bosutinib in controlling tumour iv growth in oral cancer cell lines. Technical evaluation of performance reliability of six gene signature similarity scoring algorithms showed that the Weighted Connectivity Score or the statistically significant Connectivity Map, are prime candidates for upgrading the current core algorithm of DeSigN, which is based on the Kolmogorov-Smirnov statistic. …”
    Get full text
    Get full text
    Thesis
  11. 11

    An efficient up-link load reduction model based on clustering in vanets by Abbas Al-Sallami, Ali Hashim

    Published 2019
    “…EULR model consisted of three parts: the first part, two novel algorithms Smart CH Election (SCHE) and Hybrid Cluster-Head Election (HCHE) to increase cluster stability and reduce the number of CHs changes in the network by selecting the best vehicle as cluster head (CH) based on two dynamic thresholds. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Improving named entity recognition accuracy of gene and protein in biomedical text by Tohidi, Hossein

    Published 2011
    “…The strength of our proposed approach for recognizing biomedical named entity is based on a Statistical Character-Based Syntax Similarity (SCSS) algorithm which measured similarity between all extracted candidates and the well-known biomedical named entities from a corpus. …”
    Get full text
    Get full text
    Thesis
  13. 13

    On equivalence of FIS and ELM for interpretable rule-based knowledge representation by Wong S.Y., Yap K.S., Yap H.J., Tan S.C., Chang S.W.

    Published 2023
    “…Classification (of information); Computer aided diagnosis; Fault detection; Fuzzy systems; Knowledge acquisition; Knowledge representation; Learning systems; Matrix algebra; Membership functions; Pattern recognition; Extreme learning machine; Fault detection and diagnosis; Fuzzy if-then rules; Fuzzy inference systems; Fuzzy membership function; Initialization technique; Interpretable rules; Rule based; Fuzzy inference; algorithm; artificial intelligence; artificial neural network; benchmarking; classification; electric power plant; factual database; feedback system; fuzzy logic; machine learning; nerve cell; reproducibility; statistical model; Algorithms; Artificial Intelligence; Benchmarking; Classification; Databases, Factual; Feedback; Fuzzy Logic; Machine Learning; Models, Statistical; Neural Networks (Computer); Neurons; Power Plants; Reproducibility of Results…”
    Article
  14. 14

    Bacterial image analysis using multi-task deep learning approaches for clinical microscopy by Chin, Shuang Yee, Jian, Dong, Khairunnisa, Hasikin, Romano, Ngui, Lai, Khin Wee, Pauline Yeoh, Shan Qing, Xiang, Wu

    Published 2024
    “…The performance of the DL techniques is evaluated using the quantitative assessment method based on mean average precision (mAP), precision, recall, and F1-score. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Lightweight ECC Based Multifactor Authentication Protocol (LEMAP) for Device to Device Cellular Network by Rashad Mahmood, Saqib, Adnan Shahid, Khan

    Published 2022
    “…The results show that LEMAP is 6%-28% percent stronger than the selected benchmark algorithms such as 2PAKEP, Chaotic based authentication and TwoFactor authentication protocol. …”
    Get full text
    Get full text
    Thesis
  16. 16

    An evaluation of feature selection technique for dendrite cell algorithm by Mohamad Mohsin, Mohamad Farhan, Hamdan, Abdul Razak, Abu Bakar, Azuraliza

    Published 2014
    “…From the experiment, the Rough Set Genetic Algorithm reduct is found to be the most effect feature selection for dendrite cell algorithm when it generates a consistent result for all evaluation metrics. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Effective pilot assignment schemes in massive MIMO systems by Al-Hubaishi, Ahmed Saleh Noman

    Published 2022
    “…In the EPR-PPA scheme, two pilot sets are used in the network and the PPA algorithm is implemented in cells that cause low interference at the serving cell, which share the same pilot set. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Elucidating the mechanism of action of Centella asiatica ethanolic extract and triterpenoids as a potential anti-leukaemic agent through the integration of in silico and in vitro s... by Othman, Norodiyah

    Published 2022
    “…The in vitro anti-proliferative activity was evaluated by assessing the cell apoptosis rate using annexin-V flowcytometry. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A review on the graphical user authentication algorithm : recognition-based and recall-based. by Ugochukwu, Ejike Ekeke Kingsley, Jusoh, Yusmadi Yah

    Published 2013
    “…User authentication has become an important consideration in information security as traditional password-based schemes are constantly subjected to attacks. …”
    Get full text
    Get full text
    Article
  20. 20

    An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias by Alias, Nur Farehah

    Published 2017
    “…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
    Get full text
    Get full text
    Thesis