Search Results - (( based evaluation method algorithm ) OR ( based evaluation case algorithm ))

Refine Results
  1. 1

    Case Slicing Technique for Feature Selection by A. Shiba, Omar A.

    Published 2004
    “…This technique with k = 10 has been used in this thesis to evaluate the proposed approach. CST was compared to other selected classification methods based on feature subset selection such as Induction of Decision Tree Algorithm (ID3), Base Learning Algorithm K-Nearest Nighbour Algorithm (k-NN) and NaYve Bay~sA lgorithm (NB). …”
    Get full text
    Get full text
    Thesis
  2. 2

    Incorporating the range-based method into GridSim for modeling task and resource heterogeneity by Eng, Kailun, Muhammed, Abdullah, Mohamed, Mohamad Afendee, Hasan, Sazlinah

    Published 2017
    “…As heterogeneity is one of the unique characteristics of Grid computing, which induces additional challenges in designing heuristic-based scheduling algorithms, the main concern when performing simulation experiments for evaluating the performance of scheduling algorithms is how to model and simulate different Grid scheduling scenarios or cases that capture the inherent nature of heterogeneity of Grid computing environment. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Unifying the evaluation criteria of many objectives optimization using fuzzy Delphi method by Mohammed, Rawia Tahrir, Yaakob, Razali, Mohd Sharef, Nurfadhlina, Abdullah, Rusli

    Published 2021
    “…In contrast, the performance of the MaOO algorithms assesses based on the balance between the convergence and diversity of the non-dominated solutions measured using different evaluation criteria of the quality performance indicators. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    A novel hybrid evolutionary mating algorithm for Covid19 confirmed cases prediction based on vaccination by Ahmed, Marzia, Ahmad Johari, Mohamad, Rahman, Mostafijur, Mohd Herwan, Sulaiman, Abul Kashem, Mohammod

    Published 2023
    “…As a result, developing robust mathematical models with small error margins for predictions is crucial. Based on these findings, a combined method of evaluating confirmed cases of COVID-19 with universal immunization is recommended. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal by Abdul Hamid, Jamaliah, Mohayidin, Mohd Ghazali, Selamat, Mohd Hasan, Ibrahim, Hamidah, Abdullah, Rusli, Hashim, Ruhil Hayati

    Published 2006
    “…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network by Mohammad Azmi Ridwan, Dr.

    Published 2023
    “…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
    text::Thesis
  8. 8

    Information Theoretic-based Feature Selection for Machine Learning by Muhammad Aliyu, Sulaiman

    Published 2018
    “…Thus, this thesis has developed and evaluated a filter based Information Theoretic-based Feature Selection (IFS) for machine learning. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal by Abdul Hamid, Jamaliah, Mohayidin, Mohd Ghazali, Selamat, Mohd Hassan, Ibrahim, Hamidah, Abdullah, Rusli, Hashim, Ruhil Hayati

    Published 2006
    “…Lecturer workload at universities includes three major categories: teaching, research and services.Teaching workload is influence by various factors such as level taught courses, number of student, credit and contact hour and off campus or on campus course design.The UPM has a KM Portal that contains sets of metadata on lecturer profile and knowledge assets.The Lecturer profile contains information lecturer teaching, research, publication and many more.We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload.This method measures the lecturer teaching workload.The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset.Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks by Zarafshan, Faraneh

    Published 2015
    “…Algorithms for mutual exclusion in DS are categorized into two main classes including token-based and permission-based algorithms. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed by Aneesa Ali, Ali Saeed

    Published 2017
    “…Case study evaluation was conducted based on three industrial open source case studies in order to evaluate empirically the significant of the performance of the proposed method. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Profile measurement based on focus variation method for geometrical defect evaluation: a case study of cold forged propeller blade by Abdullah, Ahmad Baharuddin, Salit, Mohd Sapuan, Samad, Zahurin

    Published 2014
    “…The profile was obtained with the use of InfiniteFocus Alicona 3D surface measurement system. Specific algorithms were developed for different cases as the evaluation of the features is discrete and the results were validated.…”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Simulated Kalman Filter algorithms for solving optimization problems by Nor Hidayati, Abdul Aziz

    Published 2019
    “…The proposed population-based SKF algorithm and the single solution-based SKF algorithm use the scalar model of discrete Kalman filter algorithm as the search strategy to overcome these flaws. …”
    Get full text
    Get full text
    Thesis
  14. 14

    The effect of dose calculation algorithms on the normal tissue complication probability values of thoracic cancer by Ahmad, Noor Ashikin

    Published 2015
    “…Four treatment plans are created and DVHs are evaluated based on criteria of acceptance level. NTCP values for thorax plan one and two are evaluated by using different algorithm. …”
    Get full text
    Get full text
    Monograph
  15. 15

    Test Cases Minimization Strategy Based On Flower Pollination Algorithm by Ho, Chai Har, Al-Sewari, Abdul Rahman Ahmed Mohammed

    Published 2016
    “…This paper describes the adoption of Flower Pollination Algorithm (FPA) in order to minimize the test cases. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Use of web page credibility information in increasing the accuracy of web-based question answering systems / Asad Ali Shah by Asad, Ali Shah

    Published 2017
    “…This research proposes a credibility assessment algorithm for evaluating Web pages and using their credibility score for ranking answers in Web-based QA systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Optimization of energy management and conversion in the water systems based on evolutionary algorithms by Karami, Hojat, Ehteram, Mohammad, Mousavi, Sayed-Farhad, Farzin, Saeed, Kisi, Ozgur, El-Shafie, Ahmed

    Published 2019
    “…Different indexes were used for evaluating the proposed methods, namely reliability index, vulnerability index, and resiliency index. …”
    Get full text
    Get full text
    Article
  18. 18

    A study on the VLSI partitions: the implementation of Fiduccia-Mattheyses algorithm / Burhanuddin Omar by Omar, Burhanuddin

    Published 1997
    “…The program is being develop using this algorithm. The evaluation and comparison also been carried out between this method and Kernighan-Lin method.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Hybrid moth flame optimization mppt algorithm for accurate real-time tracking under partially shaded photovoltaic system by Tiong, Meng Chung

    Published 2021
    “…All four MPPT methods were simulated and real-time evaluated under 10 constant irradiance test cases, 30 dynamic irradiance test cases and 100 partial shaded irradiance test cases. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Failure detection analysis of grid-connected photovoltaic system using an improved comparative based method / Fatin Azirah Mohd Shukor by Mohd Shukor, Fatin Azirah

    Published 2022
    “…Thus, the aim of this study is to detect fault occurrence in GCPV system via three consecutive FD analysis of comparison between actual AC power and predicted AC power as early FD, evaluation of AR values against AR threshold of 0.9 as intermediate FD and determination of type of failure through current and voltage ratio methods as advance FD based on CBM method. …”
    Get full text
    Get full text
    Thesis