Search Results - (( based evaluation metric algorithm ) OR ( panel optimization strategical algorithm ))
Search alternatives:
- optimization strategical »
- panel optimization »
- evaluation metric »
- based evaluation »
- metric algorithm »
-
1
Performance evaluation metrics for multi-objective evolutionary algorithms in search-based software engineering: systematic literature review
Published 2021“…Most of them either focused on solving newly re-formulated problems or on proposing new approaches, while a number of studies performed reviews and comparative studies on the performance of proposed algorithms. To evaluate such performance, it is necessary to consider a number of performance metrics that play important roles during the evaluation and comparison of investigated algorithms based on their best-simulated results. …”
Get full text
Get full text
Article -
2
A Systematic Literature Review of Machine Learning Methods for Short-term Electricity Forecasting
Published 2023Conference Paper -
3
Evaluation of Visual Network Algorithms on Historical Documents
Published 2020“…Therefore, for a new document, evaluation of algorithms is ineluctable. The study also proposed a simple but reliable cluster evaluation metric called NPL-C metric. …”
Get full text
Get full text
Get full text
Thesis -
4
Role Minimization As An Optimization Metric In Role Mining Algorithms : A Literature Review
Published 2018“…A recent access control model that could accommodate a dynamic structure such as cloud computing can be recognized as role based access control and the role management process of this access control can be identified as role mining.The current trend in role based access control is the role mining problem that can be described as the difficulty to uncover an optimum set of roles from the userpermission assignment.To solve this problem,the researchers have proposed role mining algorithms to produce role set and among the existing algorithms there is an intrinsic topic of the common perception to evaluate the goodness of the generated role set.Eventually,the value of the identified roles could be measured by the preferred metric of optimality namely the number of roles,sizes of userassignment and permission-assignment and Weighted Structural Complexity.Until now, there is some disagreement on the optimization metric but notably many researchers have agreed on the minimization of the number of roles as a solid metric.This paper discusses an overview of the current state-of-the-art on the recent role mining algorithms that focus on role minimization as an optimization metric to evaluate the goodness of the identified roles. …”
Get full text
Get full text
Get full text
Article -
5
-
6
Validation on an enhanced dendrite cell algorithm using statistical analysis
Published 2017“…This study demonstrates the mechanism of evaluating an enhanced algorithm using performance metrics and validated it using statistical analysis. …”
Get full text
Get full text
Get full text
Article -
7
LCSS-Based Algorithm for Computing Multivariate Data Set Similarity: A Case Study of Real-Time WSN Data
Published 2019“…Several non-metric-based algorithms are available in the literature, the most robust and reliable one is the dynamic programming-based technique. …”
Get full text
Get full text
Article -
8
Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms
Published 2016“…The latest effort to solve this selection problem is the development of the metrics selection model that uses genetic algorithm (GA). …”
Get full text
Get full text
Thesis -
9
Multiobjective deep reinforcement learning for recommendation systems
Published 2022“…The approaches were evaluated with movie recommendation dataset by using three conflicting metrics, namely precision, novelty, and diversity. …”
Get full text
Get full text
Article -
10
Multi-objective deep reinforcement learning for recommendation systems
Published 2022“…The approaches were evaluated with movie recommendation dataset by using three conflicting metrics, namely precision, novelty, and diversity. …”
Get full text
Get full text
Article -
11
Evaluation of the Transfer Learning Models in Wafer Defects Classification
Published 2022“…Three defects categories and one non-defect were chosen for this evaluation. The key metrics for the evaluation are classification accuracy, classification precision and classification recall. 855 images were used to train and test the algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
An intermediate significant bit (ISB) watermarking technique using neural networks
Published 2016“…Many researchers have used these approaches to evaluate their algorithms. These strategies have been used for a long time, however, which unfortunately limits the value of PSNR and NCC in reflecting the strength and weakness of the watermarking algorithms. …”
Get full text
Get full text
Article -
13
-
14
A Systematic Literature Review of Electricity Load Forecasting using Long Short-Term Memory
Published 2023Conference Paper -
15
Balancing Exploitation And Exploration Search Behavior On Nature-Inspired Clustering Algorithms
Published 2018“…All the frameworks also achieved the first rank by the Friedman aligned-ranks (FA) test in all evaluation metrics. Moreover, the three frameworks provided convergent performances in terms of the repeatability. …”
Get full text
Get full text
Thesis -
16
Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio...
Published 2023“…Comparing this developed algorithm with other algorithms shows its superiority in multi-objective optimization (MOO) evaluation metrics. …”
Get full text
Get full text
Thesis -
17
Data dissemination in VANETs using clustering and probabilistic forwarding based on adaptive jumping multi-objective firefly optimization
Published 2022“…Comparing both AJ-MOFA and CFM with benchmarks using multi-objective optimization and networking metrics reveals the superiority in most evaluation measures, which makes them promising algorithms for data dissemination in VANETs. …”
Get full text
Get full text
Article -
18
An intermediate significant bit (ISB) watermarking technique using neural networks
Published 2016“…Many researchers have used these approaches to evaluate their algorithms. These strategies have been used for a long time, however, which unfortunately limits the value of PSNR and NCC in reflecting the strength and weakness of the watermarking algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Data depublication using : Hashing algorithm / Naimah Nayan
Published 2019“…The recommendation for future work is to evaluate various type of data and different type of hashing algorithm.…”
Get full text
Get full text
Thesis -
20
Comparative evaluation of anomaly-based controller area network IDS
Published 2023“…However, these CAN IDS are often evaluated in disparate experimental settings, with different datasets and evaluation metrics, which hinder direct comparison. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
