Search Results - (( data evaluation method algorithm ) OR ( data application testing algorithm ))

Refine Results
  1. 1
  2. 2

    Neural Networks Ensemble: Evaluation of Aggregation Algorithms for Forecasting by HASSAN, SAIMA

    Published 2013
    “…The results of the aggregation algorithms of NNs ensemble are also compared with the Simple Averaging method. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Statistical analysis on enhanced 3D-AES block cipher cryptographic algorithm / Nor Azeala Mohd Yusof by Mohd Yusof, Nor Azeala

    Published 2021
    “…These two new functions are based on the confusion method proposed by Shannon’s theory since 1945. The randomness of Enhanced 3D-AES then is re-evaluated and it has passed all 15 statistical tests for all seven data categories. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm by Ahmed, M.A., Kiah, M.L.M., Zaidan, B.B., Zaidan, A.A.

    Published 2010
    “…In the second step, standard 8th LSB layer embedding has been done for this desired signal. Audio quality evaluation has used to evaluate our purposed method in two ways. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern by Angeline Teoh, Szu Fern

    Published 2012
    “…This method is used to reduce the stochastic of data generation as the second iteration will have influence of the first iteration data. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Development of an Automated Technique for Reconstructing Jawi Characters in Historical Documents by Zulcaffle, Tengku Mohd Afendi

    Published 2007
    “…The reliability of the proposed algorithms have been tested over simulated and real data. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Determination of permeability characteristics of solid/liquid separation using simplex algorithm by Tanaka, Takanori, Kato, Hiroki, Fukuyama, Ryo, Hayashi, Natsuko, Jami, Mohammed Saedi, Iwata, Masashi

    Published 2013
    “…(iii) The optimum values of α1 and  are searched by fitting theoretical time course of constant-pressure expression with experimental expression data by algorithm of simplex method. For efficacy evaluation of this estimation method, the permeability data of zinc oxide were determined using the method. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed by Aneesa Ali, Ali Saeed

    Published 2017
    “…Case study evaluation was conducted based on three industrial open source case studies in order to evaluate empirically the significant of the performance of the proposed method. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Predicting Customer Buying Decisions for Online Shopping with Unbalanced Data Set by Yap, Chau Tean

    Published 2022
    “…Six machine learning algorithms were applied and compared based on the classification evaluation methods. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    A novel peak load shaving algorithm for isolated microgrid using hybrid PV-BESS system by Rana, M.M., Romlie, M.F., Abdullah, M.F., Uddin, M., Sarkar, M.R.

    Published 2021
    “…To evaluate the effectiveness of the algorithm, simulation case studies have been conducted with actual load data and actual PV generation data. …”
    Get full text
    Get full text
    Article
  11. 11

    Partitional clustering algorithms for highly similar and sparseness y-short tandem repeat data / Ali Seman by Seman, Ali

    Published 2013
    “…Six Y-STR data sets were used as a benchmark to evaluate the performances of the algorithm against the other eight partitional clustering algorithms. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi by Rahimi, Ahmad Faris

    Published 2017
    “…Testing of the application are using 10-Fold Cross Validation technique. 90% of the data be used as a training and another 10% be used for the testing part. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Assessment of CDA and Morphlink-C Algorithms method in crack detection using [Multirotor DJ1 phantom 3] image / Muhammad Hafizi Abd Rahaim by Abd Rahaim, Muhammad Hafizi

    Published 2018
    “…Then, the image was being processed in the photogrammetry software to produce the orthomosaic and point cloud data. These data model then was evaluated their availability of processed image to detect crack using CDA and MorphLink-C algorithms. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Evaluation of the Transfer Learning Models in Wafer Defects Classification by Jessnor Arif, Mat Jizat, Anwar, P. P. Abdul Majeed, Ahmad Fakhri, Ab. Nasir, Zahari, Taha, Yuen, Edmund, Lim, Shi Xuen

    Published 2022
    “…Each image went through the embedding process by the evaluated algorithms. This enhanced image data numbers then went through Logistic Regression as a classifier. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Evaluation of Search Result of Document Search Based GA (DSEGA) by Kamal Norfarid, Kamaruddin

    Published 2004
    “…It is composed by a series of module that using information retrieval method and genetic algorithm. This toolkit does not tested by any standard test data collection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Iterative And Single-Step Solutions Of Two Dimensional Time-Domain Inverse Scattering Problem Featuring Ultra Wide Band Sensors by Binajjaj, Saeed Ali Saeed

    Published 2010
    “…In experiments, organic objects with various properties were used to simulate cancerous-like dielectric profile, while the plastic pipe was employed for further performance and testing purposes. Finally, the algorithms‘ robustness against the noisy data was evaluated using two simulated experiments with signal-to-noise ratios of 6 and 8 dB respectively.…”
    Get full text
    Get full text
    Thesis
  17. 17

    An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif by Sa’dan, Siti ‘Aisyah, Jantan, Hamidah, Abdul Latif, Mohd Hanapi

    Published 2016
    “…To achieve this objective, the research was divided into three phases, which consist of talent data identification and data preparation phase, algorithm development for prototype phase and testing and evaluation phase to identify the most suitable prediction model for talent prediction. …”
    Get full text
    Get full text
    Research Reports
  18. 18

    Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier by Siow, Shien Loong

    Published 2018
    “…Firstly, the 1D-LBP algorithm is used to extract the features of the normalized iris images and save the data in a text file according to the subject and the combinations to evaluate for the next stage. …”
    Get full text
    Get full text
    Monograph
  19. 19

    Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems by Nor Sakinah, Abdul Shukor

    Published 2019
    “…In recent years, control researchers have been switching to the method of data-driven control in order to eliminate this disparity. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems by Nor Sakinah, Abdul Shukor

    Published 2019
    “…In recent years, control researchers have been switching to the method of data-driven control in order to eliminate this disparity. …”
    Get full text
    Get full text
    Thesis