Search Results - (( _ evaluation focus algorithm ) OR ( shape identification mining algorithm ))
Search alternatives:
- identification mining »
- shape identification »
- evaluation focus »
- mining algorithm »
- focus algorithm »
-
1
Discovering association rules for mining images datasets: a proposal
Published 2005“…The algorithm has four major steps: feature extraction, object identification, auxiliary image creation and object mining. …”
Get full text
Get full text
Conference or Workshop Item -
2
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
Get full text
Get full text
Get full text
Thesis -
3
Efficiency and accuracy of scheduling algorithms for final year project evaluation management system
Published 2023“…This research paper conducts a comparative analysis of three algorithms: genetic algorithm, hill climbing algorithm, and particle swarm optimization algorithm, with a focus on evaluating their performance in scheduling presentations. …”
Get full text
Get full text
Get full text
Article -
4
Objective evaluation of speech enhancement using compressive sensing algorithm
Published 2013“…Perceptual evaluation of speech quality (PESQ) is an objective evaluation of speech enhancement algorithm used to measure the enhanced speech quality. …”
Get full text
Get full text
Get full text
Proceeding Paper -
5
Rift: a high-performance consensus algorithm for Consortium Blockchain
Published 2019“…The existing consensus algorithms are mostly concerned with public blockchain having focused on public ledgers in general. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Evaluation of feature selection algorithm for android malware detection
Published 2018“…Therefore, the proposed approach modified the TF-IDF algorithm, where the algorithm focused on both sample and feature. …”
Get full text
Article -
7
Development of lecturers' publication score algorithm / Zamali Tarmudi and Haijon Gunggut
Published 2016“…This process is vital to determine the feasibility and suitablility of the proposed algorithm. The results showed that, the proposed algorithm is highly beneficial to the evaluation committee and can significantly reduce the time consumed in the evaluation process . …”
Get full text
Get full text
Article -
8
-
9
Multichannel audio compression: performance evaluation of various algorithms
Published 2017“…This book focuses on performance evaluation of various algorithms on multichannel audio compression. …”
Get full text
Get full text
Get full text
Book -
10
Study of the MPP tracking algorithms: Focusing the numerical method techniques
Published 2016“…A comparative review between different algorithms for maximum power point (MPP) tracking is presented, particularly focusing Numerical Method (NM) techniques. …”
Get full text
Get full text
Article -
11
A comparative study on ant-colony algorithm and genetic algorithm for mobile robot planning.
Published 2024“…This paper investigates the optimization of routing for robotics vehicles in automated warehouses in Malaysia. Focusing on routing optimization, the study evaluates Ant-Colony Optimization (ACO) and Genetic Algorithm (GA) in Mobile Robot Planning. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…In addition, a prototype was developed to evaluate the proposed algorithm. Then, user satisfaction was conducted in order to evaluate this prototype using Q-SAFI instruments. …”
Get full text
Get full text
Get full text
Thesis -
13
Design of intelligent Qira’at identification algorithm
Published 2017“…A combination of Principal Component Analysis (PPCA) and Gaussian Mixture Model (GMM) is proposedly in used for the classification phase as it is able to reduce any redundancy from the latent variables and carries only the most important information through dispersion of entropy. To evaluate the algorithm, 350 samples for 10 types of Qira’at recitation are in used, and for justifying the best pattern classification, few algorithms are tested in the early preliminary evaluation with K-Nearest Neighbour, GMM and PPCA. …”
Get full text
Get full text
Thesis -
14
Laptop price prediction using decision tree algorithm / Nurnazifah Abd Mokti
Published 2024“…This research project focuses on developing a laptop price prediction model using the decision tree algorithm based on laptop specifications. …”
Get full text
Get full text
Thesis -
15
A Thresholding Algorithm for Text/Background Segmentation in Degraded Handwritten Jawi Documents
Published 2010“…The results of the new algorithm were also evaluated and compared with several algorithms. …”
Get full text
Get full text
Get full text
Article -
16
Application and evaluation of the evolutionary algorithms combined with conventional neural network to determine the building energy consumption of the residential sector
Published 2025“…The results of the evaluation demonstrated varying performances among the three evolutionary algorithms. …”
Article -
17
An enhanced ant colony system algorithm for dynamic fault tolerance in grid computing
Published 2020“…Most fault tolerance algorithms focus on fault handling techniques such as task reprocessing, checkpointing, task replication, penalty, and task migration. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Comparative analysis of blockchain consensus algorithms from Shariah perspective / Tasneem Darwish … [et al.]
Published 2020“…Blockchain platforms workflow and performance are controlled by the used consensus algorithms. Although many studies evaluated cryptocurrency from the Shariah perspective, they focused only on the Cryptocurrency concept and did not consider the underlying blockchain technology. …”
Get full text
Get full text
Get full text
Article -
19
Sentiment analysis of domestic violence prediction using Naive Bayes algorithm / Nurulizzah Mohd Rahiman
Published 2024“…The research objectives focus on studying and applying the Naive Bayes algorithm for sentiment analysis on tweets related to domestic violence, aiming to provide insights for researchers, government agencies, policymakers, and the public and develop a prediction model using Naive Bayes algorithm to evaluate its performance. …”
Get full text
Get full text
Thesis -
20
A comprehensive comparison of evolutionary optimization limited by number of evaluations against time constraints
Published 2016“…Practically allevolutionary optimization studies have focused exclusively on the use of number of fitness evaluations as the constraining factor when comparing different evolutionary algorithms (EAs). …”
Get full text
Get full text
Get full text
Get full text
Article
