Search Results - (( based simulation based algorithm ) OR ( data evaluation method algorithm ))

Refine Results
  1. 1

    A new ant based rule extraction algorithm for web classification by Ku-Mahamud, Ku Ruhana, Saian, Rizauddin

    Published 2011
    “…Web documents contain enormous number of attributes as compared to other type of data. Ant-Miner algorithm is also still lacking in efficiency, accuracy and rule simplicity because of the local minima problem.Therefore, the Ant-Miner algorithm needs to be improved by taking into consideration of the accuracy and rule simplicity criteria so that it could be used to classify Web documents data sets or any large data sets.The best attribute selection method for Web texts categorization is the combination of correlation-based evaluation with random search as the search method.However, this attribute selection method will not give the best performance in attributes reduction. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  2. 2

    Performance evaluation of different data aggregation algorithms for different types of sensors in WSN based cluster by Ali, Wala'a Hussein

    Published 2018
    “…In this project three different data aggregation algorithms coding schemes based relative difference (CS-RD), an adaptive method of data aggregation that exploits the spatial correlation between the sensor nodes (ADAM) and coding schemes based the factor of precision (CS-FP) are evaluated. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Data depublication using : Hashing algorithm / Naimah Nayan by Nayan, Naimah

    Published 2019
    “…The recommendation for future work is to evaluate various type of data and different type of hashing algorithm.…”
    Get full text
    Get full text
    Thesis
  4. 4

    Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification by Abd Samad, Md Fahmi

    Published 2011
    “…System identification is a method of determining a mathematical relation between variables and terms of a process based on observed input-output data. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems by Shakeel Ahmed, Kamboh

    Published 2014
    “…Conventionally, the numerical simulations for such devices are obtained by using the commercial simulation packages based on the Finite Element Methods (FEM). …”
    Get full text
    Get full text
    Thesis
  6. 6

    Fuzzy clustering method and evaluation based on multi criteria decision making technique by Sameer, Fadhaa Othman

    Published 2018
    “…The proposed algorithm is used as a pre-processing method for data followed by Gustafson-Kessel (GK) algorithm to classify credit scoring data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Iterative And Single-Step Solutions Of Two Dimensional Time-Domain Inverse Scattering Problem Featuring Ultra Wide Band Sensors by Binajjaj, Saeed Ali Saeed

    Published 2010
    “…Finally, the algorithms‘ robustness against the noisy data was evaluated using two simulated experiments with signal-to-noise ratios of 6 and 8 dB respectively.…”
    Get full text
    Get full text
    Thesis
  8. 8

    A Method for Automatic Removal of Eye Blink Artifacts from EEG Based on EMD-ICA by Soomro, Mumtaz, binti Badruddin, Nasreen, bin Yusoff, Mohd Zuki, Malik, Aamir Saeed

    Published 2013
    “…The proposed algorithm is evaluated on simulated EEG to calculate correlation coefficient and signal-to-artifact ratio (SAR). …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Development of a new robust hybrid automata algorithm based on surface electromyography (SEMG) signal for instrumented wheelchair control by Mohd Hanafi, Muhammad Sidik

    Published 2020
    “…Total of ten control methods determined from population and individual data were tested against another 10 healthy persons to evaluate the algorithm performance. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems by Nor Sakinah, Abdul Shukor

    Published 2019
    “…This can overcome the existing memory-based algorithms such as random search (RS) and simulated annealing (SA) which currently produce less control accuracy due to the local minimum problem. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems by Nor Sakinah, Abdul Shukor

    Published 2019
    “…This can overcome the existing memory-based algorithms such as random search (RS) and simulated annealing (SA) which currently produce less control accuracy due to the local minimum problem. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Confidence intervals (CI) for concentration parameter in von Mises distribution and analysis of missing values for circular data / Siti Fatimah binti Hassan by Hassan, Siti Fatimah

    Published 2015
    “…In this study, three imputation methods are considered namely expectation-maximization (EM) algorithm and data augmentation (DA) algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…The tool is used to evaluate the accuracy of the proposed extraction algorithm to extract the appropriate information which are needed. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Wide area measurement system in the IEEE-14 bus system using multiobjective shortest path algorithm for fault analysis by Awalin, Lilik J., Syahirah, Abd Halim, Jafferi, Jamaludin, Nor Azuana, Ramli

    Published 2021
    “…The IEEE-14 bus system was modeled in PSCAD software for simulating nineteen types of fault based on multi-objective shortest path algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Optimization of RFID network planning using MDB-FA method by Elewe, Adel Muhsin, Hasnan, Khalid, Nawawi, Azli

    Published 2017
    “…The generated data are utilized as an input representation to apply into firefly algorithm based on Density-Based Algorithm (DBSCAN) to find the optimal network solution. …”
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Extended multiple models selection algorithms based on iterative feasible generalized least squares (IFGLS) and expectation-maximization (EM) algorithm by Nur Azulia, Kamarudin

    Published 2019
    “…The empirical results for both algorithms performed well as compared to other models selection procedures, particularly using WQI data where the sample size is bigger and has good quality data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection by Siswanto, Apri, Katuk, Norliza, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…A series of simulations were conducted using MATLAB to evaluate the performance of the proposed chaotic-based encryption algorithm for FTP through different analyses covering key sensitivity, histogram, correlations, differential, information entropy, and encryption/decryption speed. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…All the three proposed algorithms are evaluated using discrete event simulation, in particular Network Simulator tool (NS2), and compared with the latest routing algorithm (NCPR ) and fundamental algorithm (AODV) using five performance metrics. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Even-odd scheduling based energy efficient routing for wireless sensor network (WSN) / Muhammad Zafar Iqbal Khan by Khan, Muhammad Zafar Iqbal

    Published 2022
    “…The performance of the proposed routing algorithm has been evaluated through simulations of well-known software MATLAB. …”
    Get full text
    Get full text
    Thesis