Search Results - (( data evaluation method algorithm ) OR ( data applications based algorithm ))

Refine Results
  1. 1

    On density-based data streams clustering algorithms: A survey by Teh, Y.W.

    Published 2017
    “…Recently, a lot of density-based clustering algorithms are extended for data streams. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream by Abdulateef, Alaa Fareed

    Published 2023
    “…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    MuDi-Stream: A multi density clustering algorithm for evolving data stream by Amini, A., Saboohi, H., Herawan, T., Teh, Y.W.

    Published 2016
    “…Density-based method has emerged as a worthwhile class for clustering data streams. …”
    Get full text
    Get full text
    Article
  4. 4

    A new ant based rule extraction algorithm for web classification by Ku-Mahamud, Ku Ruhana, Saian, Rizauddin

    Published 2011
    “…Web documents contain enormous number of attributes as compared to other type of data. Ant-Miner algorithm is also still lacking in efficiency, accuracy and rule simplicity because of the local minima problem.Therefore, the Ant-Miner algorithm needs to be improved by taking into consideration of the accuracy and rule simplicity criteria so that it could be used to classify Web documents data sets or any large data sets.The best attribute selection method for Web texts categorization is the combination of correlation-based evaluation with random search as the search method.However, this attribute selection method will not give the best performance in attributes reduction. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  5. 5

    Fuzzy clustering method and evaluation based on multi criteria decision making technique by Sameer, Fadhaa Othman

    Published 2018
    “…The proposed algorithm is used as a pre-processing method for data followed by Gustafson-Kessel (GK) algorithm to classify credit scoring data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    An adaptive density-based method for clustering evolving data streams / Amineh Amini by Amini, Amineh

    Published 2014
    “…This study proposes a density-based algorithm for clustering evolving data streams. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Field data-based mathematical modeling by Bode equations and vector fitting algorithm for renewable energy applications by Sabry, Ahmad H., Wan Hasan, Wan Zuha, Ab Kadir, M. Zainal A., Mohd Radzi, Mohd Amran, Shafie, Suhaidi

    Published 2018
    “…The most powerful features of this method is the ability to model irregular or randomly shaped data and to be applied to any algorithms that estimating models using frequency-domain data to provide state-space or transfer function for the model.…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    MotionSure: a cloud-based algorithm for detection of injected object in data in motion by Islam, Thouhedul, Olanrewaju, Rashidah Funke, Khalifa, Othman Omran

    Published 2017
    “…Although there are few algorithms for data protection in the Cloud, However, such algorithms are still prone to attack, especially in real-time data movement due to the mechanism employed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern by Angeline Teoh, Szu Fern

    Published 2012
    “…This method is used to reduce the stochastic of data generation as the second iteration will have influence of the first iteration data. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems by Nor Sakinah, Abdul Shukor

    Published 2019
    “…So far, the tuning methods used for data-driven PID for the underactuated systems are mostly based on the multi-agent-based optimization, which means that the design requires substantial computation time and make it not practical for on-line tuning applications. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems by Nor Sakinah, Abdul Shukor

    Published 2019
    “…So far, the tuning methods used for data-driven PID for the underactuated systems are mostly based on the multi-agent-based optimization, which means that the design requires substantial computation time and make it not practical for on-line tuning applications. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    An evolutionary based features construction methods for data summarization approach by Rayner Alfred, Suraya Alias, Chin, Kim On

    Published 2015
    “…In other words, this research will discuss the application of genetic algorithm to optimize the feature construction process from the Coral Reefs data to generate input data for the data summarization method called Dynamic Aggregation of Relational Attributes (DARA). …”
    Get full text
    Get full text
    Research Report
  16. 16

    Pose estimation algorithm for mobile Augmented Reality based on inertial sensor fusion by Alam, Mir Suhail, Morshidi, Malik Arman, Gunawan, Teddy Surya, Olanrewaju, Rashidah Funke, Arifin, Fatchul

    Published 2021
    “…We evaluated the performance of augmenting the 3D object using the techniques, vision-based, and incorporating the sensor data using the video data. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Evaluation of Lightning Current Using Inverse Procedure Algorithm. by Ab Kadir, Mohd Zainal Abidin, Izadi, Mahdi, Askari, Mohamad Tolou, Hajikhani, Maryam

    Published 2013
    “…In order to validate the proposed method, a set of measured electromagnetic fields are applied on proposed algorithm and the evaluated currents are compared to the corresponding measured current as well as the results are discussed accordingly. …”
    Get full text
    Get full text
    Article
  18. 18

    Reversible Watermarking Based on Sorting Prediction Algorithm by Khalid, Edris, Jasni, Mohamad Zain, Tuty Asmawaty, Abdul Kadir

    Published 2015
    “…The performance of the proposed reversible watermarking algorithm is evaluated and compared with Sachnev et al method and other methods. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Hybrid subjective evaluation method using weighted subsethood - based (WSBA) rule generation algorithm by Othman, Mahmod, Khalid, Shaiful Annuar, Abdullah, Fader, Amir Hamzah, Shezrin Hawani, Ku-Mahamud, Ku Ruhana

    Published 2013
    “…The use of fuzzy rules, which were extracted directly from input data through Weighted Subsethood-based (WSBA) Rule Generation Algorithm.WSBA rule generation use the subsethood values to generate the weights which finally produced the fuzzy general rules.The rules generated through the data provided knowledge in developed fuzzy rule The fuzzy rules embedded in the framework of subjective evaluation method showed advantages in generalizing the evaluation of the performance achievement, where the evaluation process can be conducted consistently in producing good evaluation results with the use of the membership set score.The results from the numerical examples are comparable to other fuzzy evaluation methods, even with the use of small rule size.…”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Algorithmic Loan Risk Prediction Method Based on PSO-EBGWO-Catboost by Chen, Suihai, Bong, Chih How, Chiu, Po Chan

    Published 2024
    “…Under the background of big data, it is of practical significance to prevent loan risk by the machine learning algorithm. …”
    Get full text
    Get full text
    Get full text
    Article