Search Results - (( based evaluation method algorithm ) OR ( related information resources algorithm ))*
Search alternatives:
- related information »
- based evaluation »
- method algorithm »
- resources »
-
1
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
Published 2017“…Accordingly, the aim of this research is to address the deficiency of the broadcasting method at route request stage. To overcome the issues related to the broadcasting method, several routing algorithms have been proposed over the Ad hoc on demand Distance Vactor (AODV) such as Neighbor Coverage-Based Probabilistic Rebroadcast (NCPR). …”
Get full text
Get full text
Get full text
Thesis -
2
Resource management algorithms for wavelength division multiplexing optical metro slotted ring networks
Published 2012“…Thus, leading to the improvement of the throughput while adhering to the delay pre-requisites. The performance evaluation of the proposed algorithms has been done through a detailed and extensive discrete-event-simulation analysis. …”
Get full text
Get full text
Thesis -
3
Computational dynamic support model for social support assignments around stressed individuals among graduate students
Published 2020“…Hence, this study aims to develop the dynamic configuration algorithm to provide an optimal support assignment based on information generated from both social support recipient and provision computational models. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Evaluation of land use land cover changes impacts on water quality at Nerus River using geospatial techniques / Noor Azzatul Najwa Azman
Published 2021“…Remote sensing applications in water resources management are necessary in order to determine the water quality, which is very important in solving related problems in future such as risk illness that caused by polluted water. …”
Get full text
Get full text
Thesis -
5
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. …”
Get full text
Get full text
Get full text
Article -
6
Performance comparison of some addition chain methods based on integer family
Published 2019Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Out-of-core simplification with appearance preservation for computer game applications
Published 2006“…In this thesis, out-ofcore simplification algorithm is introduced to overcome the limitation of conventional technique. …”
Get full text
Get full text
Monograph -
8
-
9
Unsupervised image segmentation for fish egg images
Published 2017“…The results of the proposed method are evaluated using Jaccard index to evaluate its effectiveness in segmenting tilapia egg images. …”
Get full text
Get full text
Student Project -
10
Stream-flow forecasting using extreme learning machines: A case study in a semi-arid region in Iraq
Published 2016“…In this study, the potential of a relatively new data-driven method, namely the extreme learning machine (ELM) method, was explored for forecasting monthly stream-flow discharge rates in the Tigris River, Iraq. …”
Get full text
Get full text
Article -
11
Standardizing and weighting the evaluation criteria of many-objective optimization competition algorithms based on fuzzy delphi and fuzzy-weighted zero-inconsistency methods
Published 2021“…Thus, this research aims to standardize and weigh the evaluation criteria of MaOO competitive algorithms base on fuzzy Delphi and new fuzzy-weighted zero-inconsistency (FWZIC) methods. …”
Get full text
Get full text
Thesis -
12
Efficient genetic partitioning-around-medoid algorithm for clustering
Published 2019“…However, the complexity of the kmedoid based algorithms in general is more than the complexity of the k-means based algorithms. …”
Get full text
Get full text
Thesis -
13
Case Slicing Technique for Feature Selection
Published 2004“…This technique with k = 10 has been used in this thesis to evaluate the proposed approach. CST was compared to other selected classification methods based on feature subset selection such as Induction of Decision Tree Algorithm (ID3), Base Learning Algorithm K-Nearest Nighbour Algorithm (k-NN) and NaYve Bay~sA lgorithm (NB). …”
Get full text
Get full text
Thesis -
14
Sudoku Generator based on hybrid algorithm / Faridah Abdul Rahman
Published 2012Get full text
Get full text
Thesis -
15
Hybrid subjective evaluation method using weighted subsethood - based (WSBA) rule generation algorithm
Published 2013“…The use of fuzzy rules, which were extracted directly from input data through Weighted Subsethood-based (WSBA) Rule Generation Algorithm.WSBA rule generation use the subsethood values to generate the weights which finally produced the fuzzy general rules.The rules generated through the data provided knowledge in developed fuzzy rule The fuzzy rules embedded in the framework of subjective evaluation method showed advantages in generalizing the evaluation of the performance achievement, where the evaluation process can be conducted consistently in producing good evaluation results with the use of the membership set score.The results from the numerical examples are comparable to other fuzzy evaluation methods, even with the use of small rule size.…”
Get full text
Get full text
Get full text
Article -
16
A Systematic Literature Review of Machine Learning Methods for Short-term Electricity Forecasting
Published 2023Conference Paper -
17
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
Get full text
Get full text
Thesis -
18
Evaluation of Lightning Current Using Inverse Procedure Algorithm.
Published 2013“…In this study an inverse procedure algorithm is proposed in the time domain to evaluate lightning return stroke current based on measured electromagnetic fields at an observation point. …”
Get full text
Get full text
Article -
19
Modified Contrast Limited Adaptive Histogram Equalization for high dynamic range images
Published 2012“…The algorithm was written by using MATLAB software. The local tone mapping method is based on the modified contrast limited adaptive histogram equalization (CLAHE) method. …”
Get full text
Get full text
Thesis -
20
Tree-based contrast subspace mining method
Published 2020“…The research works involve first preparing the real world numerical and categorical data sets. Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
Get full text
Get full text
Get full text
Thesis
