Search Results - (( data evaluation method algorithm ) OR ( data application testing algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- method algorithm »
- data application »
- data evaluation »
-
1
An Enhanced Hybrid Method Using AES Algorithm And Arabic Text Steganography
Published 2024thesis::master thesis -
2
Neural Networks Ensemble: Evaluation of Aggregation Algorithms for Forecasting
Published 2013“…The results of the aggregation algorithms of NNs ensemble are also compared with the Simple Averaging method. …”
Get full text
Get full text
Thesis -
3
Statistical analysis on enhanced 3D-AES block cipher cryptographic algorithm / Nor Azeala Mohd Yusof
Published 2021“…These two new functions are based on the confusion method proposed by Shannon’s theory since 1945. The randomness of Enhanced 3D-AES then is re-evaluated and it has passed all 15 statistical tests for all seven data categories. …”
Get full text
Get full text
Thesis -
4
A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm
Published 2010“…In the second step, standard 8th LSB layer embedding has been done for this desired signal. Audio quality evaluation has used to evaluate our purposed method in two ways. …”
Get full text
Get full text
Get full text
Article -
5
VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern
Published 2012“…This method is used to reduce the stochastic of data generation as the second iteration will have influence of the first iteration data. …”
Get full text
Get full text
Thesis -
6
Development of an Automated Technique for Reconstructing Jawi Characters in Historical Documents
Published 2007“…The reliability of the proposed algorithms have been tested over simulated and real data. …”
Get full text
Get full text
Thesis -
7
Determination of permeability characteristics of solid/liquid separation using simplex algorithm
Published 2013“…(iii) The optimum values of α1 and are searched by fitting theoretical time course of constant-pressure expression with experimental expression data by algorithm of simplex method. For efficacy evaluation of this estimation method, the permeability data of zinc oxide were determined using the method. …”
Get full text
Get full text
Get full text
Proceeding Paper -
8
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…Case study evaluation was conducted based on three industrial open source case studies in order to evaluate empirically the significant of the performance of the proposed method. …”
Get full text
Get full text
Get full text
Thesis -
9
Predicting Customer Buying Decisions for Online Shopping with Unbalanced Data Set
Published 2022“…Six machine learning algorithms were applied and compared based on the classification evaluation methods. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
A novel peak load shaving algorithm for isolated microgrid using hybrid PV-BESS system
Published 2021“…To evaluate the effectiveness of the algorithm, simulation case studies have been conducted with actual load data and actual PV generation data. …”
Get full text
Get full text
Article -
11
Partitional clustering algorithms for highly similar and sparseness y-short tandem repeat data / Ali Seman
Published 2013“…Six Y-STR data sets were used as a benchmark to evaluate the performances of the algorithm against the other eight partitional clustering algorithms. …”
Get full text
Get full text
Thesis -
12
Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi
Published 2017“…Testing of the application are using 10-Fold Cross Validation technique. 90% of the data be used as a training and another 10% be used for the testing part. …”
Get full text
Get full text
Thesis -
13
Assessment of CDA and Morphlink-C Algorithms method in crack detection using [Multirotor DJ1 phantom 3] image / Muhammad Hafizi Abd Rahaim
Published 2018“…Then, the image was being processed in the photogrammetry software to produce the orthomosaic and point cloud data. These data model then was evaluated their availability of processed image to detect crack using CDA and MorphLink-C algorithms. …”
Get full text
Get full text
Thesis -
14
Evaluation of the Transfer Learning Models in Wafer Defects Classification
Published 2022“…Each image went through the embedding process by the evaluated algorithms. This enhanced image data numbers then went through Logistic Regression as a classifier. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Evaluation of Search Result of Document Search Based GA (DSEGA)
Published 2004“…It is composed by a series of module that using information retrieval method and genetic algorithm. This toolkit does not tested by any standard test data collection. …”
Get full text
Get full text
Get full text
Thesis -
16
Iterative And Single-Step Solutions Of Two Dimensional Time-Domain Inverse Scattering Problem Featuring Ultra Wide Band Sensors
Published 2010“…In experiments, organic objects with various properties were used to simulate cancerous-like dielectric profile, while the plastic pipe was employed for further performance and testing purposes. Finally, the algorithms‘ robustness against the noisy data was evaluated using two simulated experiments with signal-to-noise ratios of 6 and 8 dB respectively.…”
Get full text
Get full text
Thesis -
17
An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif
Published 2016“…To achieve this objective, the research was divided into three phases, which consist of talent data identification and data preparation phase, algorithm development for prototype phase and testing and evaluation phase to identify the most suitable prediction model for talent prediction. …”
Get full text
Get full text
Research Reports -
18
Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier
Published 2018“…Firstly, the 1D-LBP algorithm is used to extract the features of the normalized iris images and save the data in a text file according to the subject and the combinations to evaluate for the next stage. …”
Get full text
Get full text
Monograph -
19
Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems
Published 2019“…In recent years, control researchers have been switching to the method of data-driven control in order to eliminate this disparity. …”
Get full text
Get full text
Thesis -
20
Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems
Published 2019“…In recent years, control researchers have been switching to the method of data-driven control in order to eliminate this disparity. …”
Get full text
Get full text
Thesis
