Search Results - (( based evaluation system algorithm ) OR ( writer identification using algorithm ))*

Refine Results
  1. 1

    Improved random forest for feature selection in writer identification by Sukor, Nooraziera Akmal

    Published 2015
    “…Writer Identification (WI) is a process to determine the writer of a given handwriting sample. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    A New Swarm-Based Framework for Handwritten Authorship Identification in Forensic Document Analysis by Draman @ Muda, Azah Kamilah, Choo, Yun Huoy, Draman @ Muda, Noor Azilah

    Published 2014
    “…However in this chapter, feature selection is used to obtain the unique individual significant features which are proven very important in handwriting analysis of Writer Identification domain. …”
    Get full text
    Get full text
    Book Chapter
  3. 3

    A new swarm-based framework for handwritten authorship identification in forensic document analysis by Pratama, Satrya Fajri, Draman @ Muda, Azah Kamilah, Choo, Yun Huoy, Draman @ Muda, Noor Azilah

    Published 2014
    “…The use of feature selection as one of the important machine learning task is often disregarded in Writer Identification domain, with only a handful of studies implemented feature selection phase. …”
    Get full text
    Get full text
    Book Chapter
  4. 4

    Discretization of integrated moment invariants for writer identification by Draman @ Muda, Azah Kamilah, Shamsuddin, Siti Maryam, Darus, Maslina

    Published 2008
    “…Hence, in this study, an integrated scaling formulation of Aspect Scaling Invariant is presented in Writer Identification to hunt for the individuality perseverance. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Invariants discretization for individuality representation in handwritten authorship by Draman @ Muda, Azah Kamilah, Shamsuddin, Siti Mariyam, Darus, Maslina

    Published 2008
    “…Writer identification is one of the areas in pattern recognition that have created a center of attention by many researchers to work in. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Objective and Subjective Evaluations of Adaptive Noise Cancellation Systems with Selectable Algorithms for Speech Intelligibility by Roshahliza, M. Ramli, Salina, Abdul Samad, Noor, Ali O. Abid

    Published 2018
    “…Adaptive Noise Cancellation (ANC) systems with selectable algorithms refer to ANC systems that are able to change the adaptation algorithm based on the eigenvalue spread of the noise. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Evaluation Algorithm - Based on PID Controller Design for the Unstable Systems by Wan Ismail, Ibrahim, Erliza, Serri, Mohd Riduwan, Ghazali

    Published 2015
    “…In this project, the evaluating PSO algorithm based on PID controller design for unstable system was proposed. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Fast and optimal tuning of fractional order PID controller for AVR system based on memorizable-smoothed functional algorithm by Ren Hao, Mok, Ahmad, Mohd Ashraf

    Published 2022
    “…Therefore, this study proposes a modified smoothed function algorithm (MSFA) based method to tune the FOPID controller of AVR system since it requires fewer number of function evaluation per iteration. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Educational video recommender system for computer science students using content-based filtering / Walid Burhani Mohd Zamani by Mohd Zamani, Walid Burhani

    Published 2025
    “…The objective is to study the content-based algorithm, to develop the prototype of educational video recommendation system using content-based filtering algorithm and to evaluate the performance and accuracy of the content-based filtering algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Metaheuristic searching genetic algorithm based reliability assessment of hybrid power generation system by Abdalla, Ahmed N., Nazir, Muhammad Shahzad, Ming, Xin Jiang, Kadhem, Athraa Ali, Abdul Wahab, Noor Izzri, Suqun, Cao, Rendong, Ji

    Published 2020
    “…This paper proposed a new optimization approach called Metaheuristic Scanning Genetic Algorithm (MSGA) for the evaluation of the efficiency of power generating systems. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Job position prediction based on skills and experience using machine learning algorithm / Ezaryf Hamdan by Hamdan, Ezaryf

    Published 2024
    “…The Machine Learning algorithm, comprising Random Forest, Linear Regression, XGBoost, SVM, and Stacking Ensemble, is embedded in the system for job position predictions based on the analysed data. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network by Ridwan M.A., Radzi N.A.M., Azmi K.H.M., Abdullah F., Ahmad W.S.H.M.W.

    Published 2024
    “…This study proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
    Article
  14. 14

    Efficiency and accuracy of scheduling algorithms for final year project evaluation management system by Loo, Chang Herng, Muhammad Zulfahmi Toh, Abdullah, Ahmad Fakhri, Ab. Nasir, Nur Shazwani, Kamaruddin, Nur Hafieza, Ismail

    Published 2023
    “…This research paper conducts a comparative analysis of three algorithms: genetic algorithm, hill climbing algorithm, and particle swarm optimization algorithm, with a focus on evaluating their performance in scheduling presentations. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Performance evaluation for different intrusion detection system algorithms using machine learning by Zarir, Mustafa Nadhim

    Published 2018
    “…The objectives of this project is to evaluate the performance of various intrusion detection algorithms based on machine learning. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20