Search Results - (( a distribution process algorithm ) OR ( _ evaluation styles algorithm ))

Refine Results
  1. 1

    A stylometry approach for blind linguistic steganalysis model against translation-based steganography by Mohd Lokman, Syiham

    Published 2023
    “…While targeted steganalysis is designed to attack a specific embedding algorithm, blind steganalysis use features extracted or selection from the medium to detect any anomalies that indicate a possibility that a secret data has been embedded within the medium. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    Tag clouds algorithm with the inclusion of personality traits by Ahmad Affandi, Supli

    Published 2015
    “…In addition, a prototype was developed to evaluate the proposed algorithm. Then, user satisfaction was conducted in order to evaluate this prototype using Q-SAFI instruments. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Old Jawi manuscript: Digital recognition / Zaidi Razak by Zaidi, Razak

    Published 2016
    “…The evaluation results show that the proposed approach outperforms the algorithms of other recognition methods used for comparison. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Penilaian esei berbantukan komputer menggunakan teknik Bayesian dan pengunduran linear berganda by Mohamad @ Hamza, Mohd. Azwan

    Published 2006
    “…MMB Technique only required a small size of training data. (3) Prediction process of writing style using Multiple Linear Regression (MLR) Algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Virtual reality in algorithm programming course: practicality and implications for college students by Dewi, Ika Parma, Ambiyar, Mursyida, Lativa, Effendi, Hansi, Giatman, Muhammad, Efrizon, Hanafi, Hafizul Fahri, Ali, Siti Khadijah

    Published 2024
    “…The ADDIE model is applied in this study to develop products through the stages of analysis, design, development, implementation, and evaluation. The analysis of learning problems shows the unavailability of interactive learning media that can support various learning styles of students in programming algorithm materials. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Design of intelligent Qira’at identification algorithm by Kamarudin, Noraziahtulhidayu

    Published 2017
    “…A combination of Principal Component Analysis (PPCA) and Gaussian Mixture Model (GMM) is proposedly in used for the classification phase as it is able to reduce any redundancy from the latent variables and carries only the most important information through dispersion of entropy. To evaluate the algorithm, 350 samples for 10 types of Qira’at recitation are in used, and for justifying the best pattern classification, few algorithms are tested in the early preliminary evaluation with K-Nearest Neighbour, GMM and PPCA. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Technical job distribution at BSD SHARP service center using combination of naïve Bayes and K-Nearest neighbour by Pebrianti, Dwi, Ariawan, Angga, Bayuaji, Luhur, Mahdiana, Deni, ,, Rusdah

    Published 2022
    “…From the study, it is found that the best of k value for k-NN algorithm is 15. It is known that a high number of accuracy values, the labor distribution can be more accurate. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Distributed generation allocation to reduce losses and improve voltage profile genetic algorithm: article by Abdol Azis, Hazriq Syahmie

    Published 2010
    “…This paper presents a method for the optimal allocation of Distributed generation in distribution systems. …”
    Get full text
    Get full text
    Article
  12. 12

    Optimizing crystal size distribution based on different cooling strategies in batch crystallization process by Siti Zubaidah, Adnan, Noor Asma Fazli, Abdul Samad

    Published 2024
    “…Different temperature profiles may influence the distribution of crystal products, and a suitable optimization algorithm is required to produce an optimum temperature trajectory that produces the desired CSD. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Workflow optimization in distributed computing environment for stream-based data processing model / Saima Gulzar Ahmad by Saima Gulzar, Ahmad

    Published 2017
    “…Eventually, the workflow is executed. The second algorithm is a variation in first algorithm in which data parallelism is introduced in each partition. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution / Nor Azura Ayop by Ayop, Nor Azura

    Published 2016
    “…This result help to expand the view of new idea in modelling the tele-traffic algorithm based on bandwidth management and time processing improvement. …”
    Get full text
    Get full text
    Thesis
  15. 15

    PLANNING OF MULTIPLE FEEDERS ELECTRICAL DISTRIBUTION SYSTEM by NORDIN, AHMAD SOLLEHIN

    Published 2011
    “…ectrical Distribution System is a system to distribute electricity to users. …”
    Get full text
    Get full text
    Final Year Project
  16. 16

    Clock Distribution Network Building Algorithm For Multiple Ips In System On A Chip by Tan , Tze Liang

    Published 2017
    “…The algorithm is done when a final checking on the clock skew is done. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah by Abdullah, Mohd Azrul

    Published 2015
    “…Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. …”
    Get full text
    Get full text
    Article
  18. 18

    Statistical fixed range multiple selection algorithm for peer-to-peer system by Kweh, Yeah Lun, Othman, Mohamed, Ahmad, Fatimah, Ibrahim, Hamidah

    Published 2010
    “…The algorithm uses a fixed filter range approach that has been defined before the process begin, in which the algorithm is able to make sure that the target key is within the specified filter range in each local file. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    An image segmentation algorithm for measurement of flotation froth bubble size distributions by Jahedsaravani, A., Massinaei, M., Marhaban, Mohammad Hamiruce

    Published 2017
    “…The bubble size distribution at the froth surface of a flotation cell is closely related to the process condition and performance. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Simplified channel authentication algorithm for secure quantum key distribution by Elwadeya, Mohamed Youssef Khalaf, Al-Khateeb, Khalid A. Saeed, Hasbullah, Nurul Fadzlin

    Published 2014
    “…This paper presents a simplified algorithm of the quantum authentication process (QAP) of the six-state deterministic quantum protocol (6DP). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper