Search Results - (( based evaluation method algorithm ) OR ( based evaluation model algorithm ))
Search alternatives:
- based evaluation »
- method algorithm »
- model algorithm »
-
1
Standardizing and weighting the evaluation criteria of many-objective optimization competition algorithms based on fuzzy delphi and fuzzy-weighted zero-inconsistency methods
Published 2021“…Thus, this research aims to standardize and weigh the evaluation criteria of MaOO competitive algorithms base on fuzzy Delphi and new fuzzy-weighted zero-inconsistency (FWZIC) methods. …”
Get full text
Get full text
Thesis -
2
Incorporating the range-based method into GridSim for modeling task and resource heterogeneity
Published 2017“…In this paper, we propose a new simulation model that incorporates the range-based method into GridSim for modeling and simulating heterogeneous tasks and resources in order to capture the inherent heterogeneity of Grid environments that later can be used by other researchers to test their algorithms.…”
Get full text
Get full text
Get full text
Article -
3
Unifying the evaluation criteria of many objectives optimization using fuzzy Delphi method
Published 2021“…Lastly, the most suitable criteria outcomes are formulated in the unifying model and evaluate by experts to verify the appropriateness and suitability of the model in assessing the MaOO algorithms fairly and effectively.…”
Get full text
Get full text
Article -
4
Evaluation of Lightning Current Using Inverse Procedure Algorithm.
Published 2013“…In this study an inverse procedure algorithm is proposed in the time domain to evaluate lightning return stroke current based on measured electromagnetic fields at an observation point. …”
Get full text
Get full text
Article -
5
Hybrid performance measures and mixed evaluation method for data classification problems
Published 2012“…Moreover, the GA model that was optimized by OAERP2 measure (GAoe2) performed significantly and statistically differently as compared to other OAERP2-based models through win-draw-loss evaluation method and two nonparametric tests. …”
Get full text
Get full text
Thesis -
6
Evaluation of lightning current and ground reflection factor using measured electromagnetic field
Published 2014“…In this paper, an inverse procedure algorithm is proposed to evaluate lightning return stroke current wave shapes at different heights along a lightning channel, as well as the ground reflection factor using measured electromagnetic fields at an observation point while the current model can be set for different models based on the general form of the engineering current models. …”
Get full text
Get full text
Article -
7
Agent-based extraction algorithm for computational problem solving
Published 2015“…Four agents have been proposed as an agent based model for CPS, which are User_Agent, PAC_Agent, IPO_Agent and Algorithm_Agent. …”
Get full text
Get full text
Thesis -
8
A Systematic Literature Review of Machine Learning Methods for Short-term Electricity Forecasting
Published 2023Conference Paper -
9
Evaluating the effectiveness of integrated benders decomposition algorithm and epsilon constraint method for multi-objective facility location problem under demand uncertainty
Published 2017“…This paper describes an algorithm based on Benders Decomposition Algorithm (BDA) which tries to find Pareto solutions. …”
Get full text
Get full text
Get full text
Article -
10
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…A deterministic mutation-based algorithm is introduced to overcome this problem. …”
Get full text
Get full text
Get full text
Article -
11
Modeling time series data using Genetic Algorithm based on Backpropagation Neural network
Published 2018“…This comparison is taken as a performance benchmark for the given problem. Finally, a GA based BPNN called (GA-BPNN) is designed and evaluated. …”
Get full text
Get full text
Thesis -
12
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…In order to provide an energy-efficient and secure routing method for sensors deployed within a dynamic IoT network, this paper presents a trust-aware enhanced ant colony optimization (ACO)-based routing algorithm, incorporating a lightweight trust evaluation model. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
An automatic grading model for semantic complexity of english texts using bidirectional attention-based autoencoder
Published 2024“…Finally, A Bidirectional Attention Self-Encoding English Text Semantic Complexity Automatic Grading Model (BSETG) is established. This study conducted experimental verification based on semantic Evaluation (SemEval) dataset, convolutional neural network (CNN)/Daily Mail dataset and Penn Treebank dataset, and conducted a comparative analysis with existing semantic complexity evaluation methods. …”
Get full text
Get full text
Article -
14
Hybrid group decision making method based on multi-granular information using fusion algorithms and consistent fuzzy preference relation / Siti Amnah Mohd Ridzuan
Published 2017“…These proposed methods are able to evaluate the alternatives or criteria based on the different opinion with different assessment measurement and also able to minimize the number of pair-wise comparisons when the number of criteria increase. …”
Get full text
Get full text
Thesis -
15
Speed sensorless control of permanent magnet synchronous motor using model reference adaptive system and artificial neural network / Abdul Mu’iz Nazelan
Published 2019“…Model reference adaptive system (MRAS) is effective for accurate control of speed and position for the PMSM in sensorless-based method. …”
Get full text
Get full text
Thesis -
16
Haze removal algorithm using improved restoration model based on dark channel prior / Dai Zhen
Published 2019“…Based on the atmospheric physical model, this research proposed a haze removal algorithm using improved restoration model based on dark channel prior, which has good robustness to the bright sky regions, and also has a good effect on the edges. …”
Get full text
Get full text
Get full text
Thesis -
17
-
18
An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons
Published 2020“…In addition, four types of intrusion detection evaluation datasets were applied to evaluate the proposed model in comparison to the others. …”
Get full text
Get full text
Get full text
Article -
19
Perceptual speech enhancement exploiting temporal masking properties of human auditory system
Published 2010“…Objective evaluation using PESQ revealed that using the proposed forward masking model, the speech enhancement algorithm outperforms the other algorithms by 6–20% depending on the SNR. …”
Get full text
Get full text
Get full text
Article -
20
Evaluation of the Transfer Learning Models in Wafer Defects Classification
Published 2022“…Five algorithms were evaluated namely VGG16, VGG19, InceptionV3, DeepLoc and Squeezenet. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
