Search Results - (( data deviation between algorithm ) OR ( java application stemming algorithm ))

Refine Results
  1. 1

    Hazard identification on fractionation column using rule based expert system by Mohd Yunus, Mohd Yusri, Ali, Mohamad Wijayanuddin

    Published 2001
    “…The study has contributed to an improvement of hazard identification technique and proposed an algorithm by considering the whole consequences of process deviation in each stream. …”
    Get full text
    Get full text
    Article
  2. 2

    A study of fluctuations and confidence of implementation in genetic algorithm optimized network in data centre by Nurika, O., Hassan, M.F., Zakaria, N., Jung, L.T.

    Published 2018
    “…The purpose of this study is to observe the reliability of genetic algorithm in our previously simulated network optimization in a data centre. …”
    Get full text
    Get full text
    Article
  3. 3

    A study of fluctuations and confidence of implementation in genetic algorithm optimized network in data centre by Nurika, O., Hassan, M.F., Zakaria, N., Jung, L.T.

    Published 2018
    “…The purpose of this study is to observe the reliability of genetic algorithm in our previously simulated network optimization in a data centre. …”
    Get full text
    Get full text
    Article
  4. 4

    Neural Network Model and Finite Element Simulation of Spring back in Plane-Strain Metallic Beam Bending by Abu Khadra, Fayiz Y. M.

    Published 2006
    “…The standard deviation between the finite element method and the neural network metamodels for the two functions are 0.635 degree and 0.985 mm respectively. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Ensemble divide and conquer approach to solve the rating scores’ deviation in recommendation system by Al-Hadi, Ismail Ahmed Al-Qasem, Mohd Sharef, Nurfadhlina, Sulaiman, Md Nasir, Mustapha, Norwati

    Published 2016
    “…Therefore, this paper proposes Ensemble Divide and Conquer (EDC) approach for solving 2 main problems which are the data sparsity and the rating scores’ deviation (misplace). …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model by Nur Faraidah, Muhammad Di, Siti Zanariah, Satari

    Published 2017
    “…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. Clustering technique basically utilizes distance measure to define distance between various data points. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9

    Three-dimension coronary artery tree curvature confirmation by Khaleel, Hasan Hadi, O. K. Rahmat, Rahmita Wirza, Dimon, Mohd Zamrin, Mahmod, Ramlan, Mustapha, Norwati

    Published 2010
    “…The standard approach was published in 1998 as a study comparing certain 3D curvature measurement algorithms. Approach: Our approach consists of three major steps: (1) Apply the paraboloid fitting technique from the standard approach; (2) Apply the 3D reconstruction algorithm proposed in this research on the same data in step (1) and (3) Apply the Standard Deviation technique on both outputs from (1) and (2) and compare the outputs. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Identification of continuous-time hammerstein model using improved archimedes optimization algorithm by Islam, Muhammad Shafiqul, Mohd Ashraf, Ahmad, Cho, Bo Wen

    Published 2024
    “…This proposed algorithm also discerned linear and nonlinear subsystem variables within a continuous-time Hammerstein model utilizing input and output data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    The Development of an Algorithm to Determine Axial Capacity of Piles from SPT N-Values by Ambrose, Jasmin

    Published 2000
    “…The comparison between measured and predicted capacities was conducted using standard deviation values to determine the amount of error in the prediction. …”
    Get full text
    Get full text
    Thesis
  12. 12

    New heuristic function in ant colony system for the travelling salesman problem by Alobaedy, Mustafa Muwafak, Ku-Mahamud, Ku Ruhana

    Published 2012
    “…Experiments conducted have used eight data sets from TSPLIB with different numbers of cities.The proposed algorithm shows promising results when compared to classical ACS in term of best, average, and standard deviation of the best tour length.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Automated negative lightning return strokes characterization using brute-force search algorithm by Abdul Haris, Faranadia, Ab. Kadir, Mohd Zainal Abidin, Sudin, Sukhairi, Jasni, Jasronita, Johari, Dalina, Zaini, Nur Hazirah

    Published 2022
    “…The statistical analysis showed a good agreement between the manual and automated data with a percentage difference of 1.19% to 4.82%. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Automated negative lightning return strokes characterization using brute-force search algorithm by Abdul Haris, Faranadia, Ab. Kadir, Mohd Zainal Abidin, Sudin, Sukhairi, Jasni, Jasronita, Johari, Dalina, Zaini, Nur Hazirah

    Published 2022
    “…The statistical analysis showed a good agreement between the manual and automated data with a percentage difference of 1.19% to 4.82%. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Improved criteria determination of an automated negative lightning return strokes characterisation using Brute-Force search algorithm by Abdul Haris, Faranadia

    Published 2021
    “…A total of 206 negative lightning return strokes waveforms were analysed and automatically characterised using the proposed algorithm. Comparisons of different data, including the manual data (i.e. obtained through the conventional method), data (automated) from a previous study, and the automated data (i.e. obtained using the proposed algorithm), were also carried out by evaluating the percentage difference, arithmetic mean, and standard deviation. …”
    Get full text
    Get full text
    Thesis
  17. 17

    An enhancement of classification technique based on rough set theory for intrusion detection system application by Noor Suhana, Sulaiman

    Published 2019
    “…In particular, the proposed algorithm obtains satisfactory compromise between the number of cuts and classification accuracy.…”
    Get full text
    Get full text
    Thesis
  18. 18

    Particle filter approach for tracking indoor user location using IEEE 802.11 signals by Mantoro, Teddy, Ayu, Media Anugerah, Raman, Shakiratul Husna, Latiff , N. H. M.

    Published 2011
    “…The paper discussed the comparison between the true location and the estimated location based on two types of signals data: normal data and noise data. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    A novel enhancement technique of the hill cipher for effective cryptographic purposes. by Abidin, A.F.A., Chuan, O.Y., Kamel Ariffin, Muhammad Rezal

    Published 2011
    “…Results: A comparative study has been made between the proposed algorithm and the existing algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Dosimetric verification of monaco treatment planning system (TPS) in heterogeneous medium for 6 mv linac by Azlan, Adriana Batrisyia Noor Mohd

    Published 2024
    “…However, VMAT planning revealed significant deviations (3.06% to 67.88%) between calculated and measured doses, with a significant difference (p < 0.01) and a 52.5% gamma passing rate for film dosimetry. …”
    Get full text
    Get full text
    Thesis