Search Results - (( based evaluation metric algorithm ) OR ( panel identification system algorithm ))

Refine Results
  1. 1

    Performance evaluation metrics for multi-objective evolutionary algorithms in search-based software engineering: systematic literature review by Nuh, Jamal Abdullahi, Koh, Tieng Wei, Baharom, Salmi, Osman, Mohd Hafeez, Kew, Si Na

    Published 2021
    “…Most of them either focused on solving newly re-formulated problems or on proposing new approaches, while a number of studies performed reviews and comparative studies on the performance of proposed algorithms. To evaluate such performance, it is necessary to consider a number of performance metrics that play important roles during the evaluation and comparison of investigated algorithms based on their best-simulated results. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Evaluation of Visual Network Algorithms on Historical Documents by Khairunnisa, Binti Ibrahim

    Published 2020
    “…Therefore, for a new document, evaluation of algorithms is ineluctable. The study also proposed a simple but reliable cluster evaluation metric called NPL-C metric. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Role Minimization As An Optimization Metric In Role Mining Algorithms : A Literature Review by Ahmad, Rabiah, Abd Hamid, Nazirah, Selamat, Siti Rahayu

    Published 2018
    “…A recent access control model that could accommodate a dynamic structure such as cloud computing can be recognized as role based access control and the role management process of this access control can be identified as role mining.The current trend in role based access control is the role mining problem that can be described as the difficulty to uncover an optimum set of roles from the userpermission assignment.To solve this problem,the researchers have proposed role mining algorithms to produce role set and among the existing algorithms there is an intrinsic topic of the common perception to evaluate the goodness of the generated role set.Eventually,the value of the identified roles could be measured by the preferred metric of optimality namely the number of roles,sizes of userassignment and permission-assignment and Weighted Structural Complexity.Until now, there is some disagreement on the optimization metric but notably many researchers have agreed on the minimization of the number of roles as a solid metric.This paper discusses an overview of the current state-of-the-art on the recent role mining algorithms that focus on role minimization as an optimization metric to evaluate the goodness of the identified roles. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Model predictive control for MPPT of distributed photovoltaic module by Jowalin, Wellfred

    Published 2017
    “…A conventional P&O technique was design by develop the algorithm to compare the result. A plant using system identification developed as the MPC needs a plant for prediction. …”
    Get full text
    Get full text
    Student Project
  7. 7

    Validation on an enhanced dendrite cell algorithm using statistical analysis by Mohamad Mohsin, Mohamad Farhan, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Abd Wahab, Mohd Helmy

    Published 2017
    “…This study demonstrates the mechanism of evaluating an enhanced algorithm using performance metrics and validated it using statistical analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    LCSS-Based Algorithm for Computing Multivariate Data Set Similarity: A Case Study of Real-Time WSN Data by Khan, Rahim, Ali, Ihsan, Altowaijri, Saleh, Zakarya, Muhammad, Rahman, Atiq Ur, Ahmedy, Ismail, Khan, Anwar, Gani, Abdullah

    Published 2019
    “…Several non-metric-based algorithms are available in the literature, the most robust and reliable one is the dynamic programming-based technique. …”
    Get full text
    Get full text
    Article
  9. 9

    Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms by Bakar, Abubakar Diwani

    Published 2016
    “…The latest effort to solve this selection problem is the development of the metrics selection model that uses genetic algorithm (GA). …”
    Get full text
    Get full text
    Thesis
  10. 10

    A review of deep learning-based defect detection and panel localization for photovoltaic panel surveillance system by Mohamed Ameerdin, Muhammad Irshat, Jamaluddin, Muhammad Herman, Shukor, Ahmad Zaki, Mohamad, Syazwani

    Published 2024
    “…YOLO algorithms are utilized for their real-time detection capabilities, allowing for immediate identification and categorization of defects during routine inspections. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Multiobjective deep reinforcement learning for recommendation systems by Ee, Yeo Keat, Mohd Sharef, Nurfadhlina, Yaakob, Razali, Kasmiran, Khairul Azhar, Marlisah, Erzam, Mustapha, Norwati, Zolkepli, Maslina

    Published 2022
    “…The approaches were evaluated with movie recommendation dataset by using three conflicting metrics, namely precision, novelty, and diversity. …”
    Get full text
    Get full text
    Article
  12. 12

    Multi-objective deep reinforcement learning for recommendation systems by Keat, Ee Yeo, Mohd Sharef, Nurfadhlina, Yaakob, Razali, Kasmiran, Khairul Azhar, Marlisah, Erzam, Mustapha, Norwati, Zolkepli, Maslina

    Published 2022
    “…The approaches were evaluated with movie recommendation dataset by using three conflicting metrics, namely precision, novelty, and diversity. …”
    Get full text
    Get full text
    Article
  13. 13

    Evaluation of the Transfer Learning Models in Wafer Defects Classification by Jessnor Arif, Mat Jizat, Anwar, P. P. Abdul Majeed, Ahmad Fakhri, Ab. Nasir, Zahari, Taha, Yuen, Edmund, Lim, Shi Xuen

    Published 2022
    “…Three defects categories and one non-defect were chosen for this evaluation. The key metrics for the evaluation are classification accuracy, classification precision and classification recall. 855 images were used to train and test the algorithms. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    An intermediate significant bit (ISB) watermarking technique using neural networks by Zeki, A., Abubakar, A., Chiroma, H.

    Published 2016
    “…Many researchers have used these approaches to evaluate their algorithms. These strategies have been used for a long time, however, which unfortunately limits the value of PSNR and NCC in reflecting the strength and weakness of the watermarking algorithms. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17

    Balancing Exploitation And Exploration Search Behavior On Nature-Inspired Clustering Algorithms by Alswaitti, Mohammed Y. T.

    Published 2018
    “…All the frameworks also achieved the first rank by the Friedman aligned-ranks (FA) test in all evaluation metrics. Moreover, the three frameworks provided convergent performances in terms of the repeatability. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio... by Daba, Layth Muwafaq Abdulhussein

    Published 2023
    “…Comparing this developed algorithm with other algorithms shows its superiority in multi-objective optimization (MOO) evaluation metrics. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Data dissemination in VANETs using clustering and probabilistic forwarding based on adaptive jumping multi-objective firefly optimization by Hamdi, Mustafa Maad, Audah, Lukman, Rashid, Sami Abduljabbar

    Published 2022
    “…Comparing both AJ-MOFA and CFM with benchmarks using multi-objective optimization and networking metrics reveals the superiority in most evaluation measures, which makes them promising algorithms for data dissemination in VANETs. …”
    Get full text
    Get full text
    Article
  20. 20

    An intermediate significant bit (ISB) watermarking technique using neural networks by Zeki, Akram M., Abubakar, Adamu, Chiroma , Haruna

    Published 2016
    “…Many researchers have used these approaches to evaluate their algorithms. These strategies have been used for a long time, however, which unfortunately limits the value of PSNR and NCC in reflecting the strength and weakness of the watermarking algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article