Search Results - (( based evaluation method algorithm ) OR ( program validation using algorithm ))

Refine Results
  1. 1

    Case Slicing Technique for Feature Selection by A. Shiba, Omar A.

    Published 2004
    “…The classification accuracy obtained from the CST method is compared to other selected classification methods such as Value Difference Metric (VDM), Pre-Category Feature Importance (PCF), Cross-Category Feature Importance (CCF), Instance-Based Algorithm (IB4), Decision Tree Algorithms such as Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5), Rough Set methods such as Standard Integer Programming (SIP) and Decision Related Integer Programming (DRIP) and Neural Network methods such as the Multilayer method.…”
    Get full text
    Get full text
    Thesis
  2. 2

    Efficient genetic partitioning-around-medoid algorithm for clustering by Garib, Sarmad Makki Mohammed

    Published 2019
    “…However, the complexity of the kmedoid based algorithms in general is more than the complexity of the k-means based algorithms. …”
    Get full text
    Get full text
    Thesis
  3. 3

    System identification using Extended Kalman Filter by Alias, Ahmad Hafizi

    Published 2017
    “…In order to evaluate the performance of the EKF learning algorithm, the proposed algorithm validation were analyzed using model validation methods as a checker such as One Step Ahead (OSA) and correlation coefficient (R2). …”
    Get full text
    Get full text
    Student Project
  4. 4

    Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi by Rahimi, Ahmad Faris

    Published 2017
    “…The second one is to develop prototype for classification of credit cardholder behavior based on k Nearest Neighbors Algorithm. The third one is to evaluate the accuracy of the k Nearest Neighbors algorithm in the classification credit card holder behavior. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Graph theory approach for managing lecturers’ schedule using graph colouring method / Siti Nor Ba Basri, Nur Su’aidah Khozaid and Farhana Hazwani Ismail by Basri, Siti Nor Ba, Khozaid, Nur Su’aidah, Ismail, Farhana Hazwani

    Published 2023
    “…This study seeks to optimize the scheduling process by employing a graph theory approach with graph colouring method, as well as results validation by Integer Linear Programming (ILP) based on the graph colouring outcome by using the Phyton programming software, to effectively assign time slots for courses and lecturers while managing the risk of clashes and omissions. …”
    Get full text
    Get full text
    Student Project
  6. 6
  7. 7

    Power System State Estimation In Large-Scale Networks by NURSYARIZAL MOHD NOR, NURSYARIZAL

    Published 2010
    “…The gain and the Jacobian matrices associated with the basic algorithm require large storage and have to be evaluated at every iteration, resulting in more computation time. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A single measurement of combined Direct and indirect MPPT algorithm for mismatch PV module application / Mohd Najib Mohd Hussain by Mohd Hussain, Mohd Najib

    Published 2016
    “…The development of the system is carried out using Matlab/Simulink incorporated with MPLAB programming for evaluating and validating the system. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Development of a novel natural frequencies prediction tool for laminated composite plates using integrated artificial neural network (ANN) - simulink MATLAB / Mohd Arif Mat Norman by Mat Norman, Mohd Arif

    Published 2024
    “…The study conducted 16 case studies, and the program's predictions were validated using analytical methods and compared to FE modal results. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The evaluation of the security of the proposed scheme is based on SVO logic to verify the security of the informal method. …”
    Get full text
    Get full text
    Thesis
  11. 11

    New techniques incorporating computational intelligence based for voltage stability evaluation and improvement in power system / Nur Fadilah Ab. Aziz by Ab. Aziz, Nur Fadilah

    Published 2014
    “…Another new hybrid algorithm that used Evolutionary Programming (EP) termed as Evolutionary Support Vector Machine (ESVM) was also developed for comparative study. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Initial assessment of facial nerve paralysis based on motion analysis using optical flow method by Wan Syahirah, Wan Samsudin

    Published 2015
    “…Acknowledging the importance of this facial assessment, this research was conducted to develop an initial assessment methodthat can classify normal and patient subjects based on facial motion analysis using Optical Flow algorithm as well as categorizing the severity of patient into six levels according to House-Brackmann (I-TB) system. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Evaluation of retinal vascular calibers in overweight an obese Malay children by Siang, Chai Khai

    Published 2017
    “…Retinal vascular caliber was measured using a validated computer-based program Singapore I Vessel Algorithm software and were summarized as the retinal arteriolar equivalent (CRAE) and central retinal venular equivalent (CRVE) by using the Kudtson-Parr-Hubbard formula. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Modeling Of Electrical Distribution Networks With Particle Swarm Optimization Technique For The Improvement Of Voltage Profile And Loss Reduction by Shahad, Falih Khlaif

    Published 2016
    “…The IEEE tests have been used to validate this work. Two tests, as the IEEE 34 bus test and IEEE 13 bus test are implemented. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Coastal Priority Ranking in Oil Spill Response Decision Support Mechanism by Pourvakhshouri, Seyedeh Zahra

    Published 2008
    “…Analyses of questions were conducted using Delphi method, Likert scaling, and repertory grid analysis. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman by Muhammad Habib , Ur Rehman

    Published 2016
    “…However, the adaptive execution model facilitates in seamless execution of MDSM applications having low data-intensity but high computational complexities. Multiple evaluation methods were used in order to verify and validate the performance of proposed architecture and execution models. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Standardizing and weighting the evaluation criteria of many-objective optimization competition algorithms based on fuzzy delphi and fuzzy-weighted zero-inconsistency methods by Salih, Rawia Tahrir

    Published 2021
    “…Thus, this research aims to standardize and weigh the evaluation criteria of MaOO competitive algorithms base on fuzzy Delphi and new fuzzy-weighted zero-inconsistency (FWZIC) methods. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Development of electromyography-controlled 3D printed robot hand and supervised machine learning for signal classification by Abdul Wahit, Mohamad Aizat

    Published 2019
    “…However, the current research state is unsatisfactory, especially in terms of structural design, robot system and the robot control method. In this research, an EMG controlled 3D printed robot hand prototype with improved features and advance hand posture classification method based on EMG signal pattern were proposed. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A multi-depot vehicle routing problem with stochastic road capacity and reduced two-stage stochastic integer linear programming models for rollout algorithm by Anuar, Wadi Khalid, Lee, Lai Soon, Seow, Hsin Vonn, Pickl, Stefan

    Published 2021
    “…Then an extension, MDVRPSRC-2S, is presented as an offline two-stage SILP model of the MDDVRPSRC. These models are validated using small simulated instances with CPLEX. …”
    Get full text
    Get full text
    Article