Search Results - (( based evaluation method algorithm ) OR ( related information resources algorithm ))*

Refine Results
  1. 1

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…Accordingly, the aim of this research is to address the deficiency of the broadcasting method at route request stage. To overcome the issues related to the broadcasting method, several routing algorithms have been proposed over the Ad hoc on demand Distance Vactor (AODV) such as Neighbor Coverage-Based Probabilistic Rebroadcast (NCPR). …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Resource management algorithms for wavelength division multiplexing optical metro slotted ring networks by Mohammed Abdulrazak, Fuaad Hasan

    Published 2012
    “…Thus, leading to the improvement of the throughput while adhering to the delay pre-requisites. The performance evaluation of the proposed algorithms has been done through a detailed and extensive discrete-event-simulation analysis. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Computational dynamic support model for social support assignments around stressed individuals among graduate students by Al-Shorman, Roqia Rateb

    Published 2020
    “…Hence, this study aims to develop the dynamic configuration algorithm to provide an optimal support assignment based on information generated from both social support recipient and provision computational models. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Evaluation of land use land cover changes impacts on water quality at Nerus River using geospatial techniques / Noor Azzatul Najwa Azman by Najwa Azman, Noor Azzatul

    Published 2021
    “…Remote sensing applications in water resources management are necessary in order to determine the water quality, which is very important in solving related problems in future such as risk illness that caused by polluted water. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Application of machine learning and artificial intelligence in detecting SQL injection attacks by Md Sultan, Abu Bakar, Agiliga, Nwabudike Augustine, Osman, Mohd Hafeez Bin, Sharif, Khaironi Yatim

    Published 2024
    “…The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Out-of-core simplification with appearance preservation for computer game applications by Bade, Abdullah, Daman, Daut, Sunar, Mohd. Shahrizal, Tan , Kim Heok

    Published 2006
    “…In this thesis, out-ofcore simplification algorithm is introduced to overcome the limitation of conventional technique. …”
    Get full text
    Get full text
    Monograph
  8. 8
  9. 9

    Unsupervised image segmentation for fish egg images by Mohd Yusof, Nur Syazwani Izzati

    Published 2017
    “…The results of the proposed method are evaluated using Jaccard index to evaluate its effectiveness in segmenting tilapia egg images. …”
    Get full text
    Get full text
    Student Project
  10. 10

    Stream-flow forecasting using extreme learning machines: A case study in a semi-arid region in Iraq by Yaseen, Z.M., Jaafar, O., Deo, R.C., Kisi, O., Adamowski, J., Quilty, J., El-Shafie, A.

    Published 2016
    “…In this study, the potential of a relatively new data-driven method, namely the extreme learning machine (ELM) method, was explored for forecasting monthly stream-flow discharge rates in the Tigris River, Iraq. …”
    Get full text
    Get full text
    Article
  11. 11

    Standardizing and weighting the evaluation criteria of many-objective optimization competition algorithms based on fuzzy delphi and fuzzy-weighted zero-inconsistency methods by Salih, Rawia Tahrir

    Published 2021
    “…Thus, this research aims to standardize and weigh the evaluation criteria of MaOO competitive algorithms base on fuzzy Delphi and new fuzzy-weighted zero-inconsistency (FWZIC) methods. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Efficient genetic partitioning-around-medoid algorithm for clustering by Garib, Sarmad Makki Mohammed

    Published 2019
    “…However, the complexity of the kmedoid based algorithms in general is more than the complexity of the k-means based algorithms. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Case Slicing Technique for Feature Selection by A. Shiba, Omar A.

    Published 2004
    “…This technique with k = 10 has been used in this thesis to evaluate the proposed approach. CST was compared to other selected classification methods based on feature subset selection such as Induction of Decision Tree Algorithm (ID3), Base Learning Algorithm K-Nearest Nighbour Algorithm (k-NN) and NaYve Bay~sA lgorithm (NB). …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Hybrid subjective evaluation method using weighted subsethood - based (WSBA) rule generation algorithm by Othman, Mahmod, Khalid, Shaiful Annuar, Abdullah, Fader, Amir Hamzah, Shezrin Hawani, Ku-Mahamud, Ku Ruhana

    Published 2013
    “…The use of fuzzy rules, which were extracted directly from input data through Weighted Subsethood-based (WSBA) Rule Generation Algorithm.WSBA rule generation use the subsethood values to generate the weights which finally produced the fuzzy general rules.The rules generated through the data provided knowledge in developed fuzzy rule The fuzzy rules embedded in the framework of subjective evaluation method showed advantages in generalizing the evaluation of the performance achievement, where the evaluation process can be conducted consistently in producing good evaluation results with the use of the membership set score.The results from the numerical examples are comparable to other fuzzy evaluation methods, even with the use of small rule size.…”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Multi-base number representation in application to scalar multiplication and pairing computation by Mohammed Ismail, Abdelwahed

    Published 2011
    “…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Evaluation of Lightning Current Using Inverse Procedure Algorithm. by Ab Kadir, Mohd Zainal Abidin, Izadi, Mahdi, Askari, Mohamad Tolou, Hajikhani, Maryam

    Published 2013
    “…In this study an inverse procedure algorithm is proposed in the time domain to evaluate lightning return stroke current based on measured electromagnetic fields at an observation point. …”
    Get full text
    Get full text
    Article
  19. 19

    Modified Contrast Limited Adaptive Histogram Equalization for high dynamic range images by Tung, Li Qian

    Published 2012
    “…The algorithm was written by using MATLAB software. The local tone mapping method is based on the modified contrast limited adaptive histogram equalization (CLAHE) method. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Tree-based contrast subspace mining method by Florence Sia Fui Sze

    Published 2020
    “…The research works involve first preparing the real world numerical and categorical data sets. Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
    Get full text
    Get full text
    Get full text
    Thesis