Search Results - (( data evaluation method algorithm ) OR ( using simulation based algorithm ))
Search alternatives:
- method algorithm »
- simulation based »
- data evaluation »
-
1
A new ant based rule extraction algorithm for web classification
Published 2011“…Web documents contain enormous number of attributes as compared to other type of data. Ant-Miner algorithm is also still lacking in efficiency, accuracy and rule simplicity because of the local minima problem.Therefore, the Ant-Miner algorithm needs to be improved by taking into consideration of the accuracy and rule simplicity criteria so that it could be used to classify Web documents data sets or any large data sets.The best attribute selection method for Web texts categorization is the combination of correlation-based evaluation with random search as the search method.However, this attribute selection method will not give the best performance in attributes reduction. …”
Get full text
Get full text
Get full text
Get full text
Monograph -
2
Data depublication using : Hashing algorithm / Naimah Nayan
Published 2019“…The objective of this project is to compare MD5 & SHA-1 algorithm in data deduplication technique and to evaluate the MD5 & SHA-1 algorithm, length of message digest and speed using deduplication software. …”
Get full text
Get full text
Thesis -
3
Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems
Published 2014“…Conventionally, the numerical simulations for such devices are obtained by using the commercial simulation packages based on the Finite Element Methods (FEM). …”
Get full text
Get full text
Thesis -
4
Fuzzy clustering method and evaluation based on multi criteria decision making technique
Published 2018“…The proposed algorithm is used as a pre-processing method for data followed by Gustafson-Kessel (GK) algorithm to classify credit scoring data. …”
Get full text
Get full text
Get full text
Thesis -
5
Iterative And Single-Step Solutions Of Two Dimensional Time-Domain Inverse Scattering Problem Featuring Ultra Wide Band Sensors
Published 2010“…Finally, the algorithms‘ robustness against the noisy data was evaluated using two simulated experiments with signal-to-noise ratios of 6 and 8 dB respectively.…”
Get full text
Get full text
Thesis -
6
Performance evaluation of different data aggregation algorithms for different types of sensors in WSN based cluster
Published 2018“…In this project three different data aggregation algorithms coding schemes based relative difference (CS-RD), an adaptive method of data aggregation that exploits the spatial correlation between the sensor nodes (ADAM) and coding schemes based the factor of precision (CS-FP) are evaluated. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
-
8
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…Identification studies using NARX (Nonlinear AutoRegressive with eXogenous input) models employing simulated systems and real plant data are used to demonstrate that the algorithm is able to detect significant variables and terms faster and to select a simpler model structure than other well-known EC methods.…”
Get full text
Get full text
Get full text
Article -
9
System identification using Extended Kalman Filter
Published 2017“…In order to evaluate the performance of the EKF learning algorithm, the proposed algorithm validation were analyzed using model validation methods as a checker such as One Step Ahead (OSA) and correlation coefficient (R2). …”
Get full text
Get full text
Student Project -
10
Extended multiple models selection algorithms based on iterative feasible generalized least squares (IFGLS) and expectation-maximization (EM) algorithm
Published 2019“…The empirical results for both algorithms performed well as compared to other models selection procedures, particularly using WQI data where the sample size is bigger and has good quality data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Development of an Automated Technique for Reconstructing Jawi Characters in Historical Documents
Published 2007“…The reliability of the proposed algorithms have been tested over simulated and real data. …”
Get full text
Get full text
Thesis -
12
Wide area measurement system in the IEEE-14 bus system using multiobjective shortest path algorithm for fault analysis
Published 2021“…To evaluate the performance of the multi-objective shortest path algorithm, all sections of the IEEE-14 bus system were simulated with faults. …”
Get full text
Get full text
Get full text
Article -
13
Development of a new robust hybrid automata algorithm based on surface electromyography (SEMG) signal for instrumented wheelchair control
Published 2020“…Total of ten control methods determined from population and individual data were tested against another 10 healthy persons to evaluate the algorithm performance. …”
Get full text
Get full text
Thesis -
14
Optimization of RFID network planning using MDB-FA method
Published 2017“…Monte Carlo simulation (MCS) is used to generate tag distribution based on network topology design modules as a method to evaluate the deterministic indicators in NP-hard problems. …”
Get full text
Get full text
Article -
15
Resource scheduling algorithm with load balancing for cloud service provisioning
Published 2019“…Simulations were conducted to evaluate the effectiveness using Cloudsim simulator in cloud data centers and results shows that the proposed method achieves better performance in terms of average success rate, resource scheduling efficiency and response time. …”
Get full text
Get full text
Article -
16
Agent-based extraction algorithm for computational problem solving
Published 2015“…The tool is used to evaluate the accuracy of the proposed extraction algorithm to extract the appropriate information which are needed. …”
Get full text
Get full text
Thesis -
17
Detection of multiple outliners in linear regression using nonparametric methods
Published 2004“…Generally, method proposed by Sebert et al. (1998) is based on the use of single linkage clustering algorithm with the Euclidean distances to cluster the points in the plots of standard predicted versus residuals values from a linear regression model. …”
Get full text
Get full text
Monograph -
18
Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems
Published 2019“…So far, the tuning methods used for data-driven PID for the underactuated systems are mostly based on the multi-agent-based optimization, which means that the design requires substantial computation time and make it not practical for on-line tuning applications. …”
Get full text
Get full text
Thesis -
19
Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems
Published 2019“…So far, the tuning methods used for data-driven PID for the underactuated systems are mostly based on the multi-agent-based optimization, which means that the design requires substantial computation time and make it not practical for on-line tuning applications. …”
Get full text
Get full text
Thesis -
20
Even-odd scheduling based energy efficient routing for wireless sensor network (WSN) / Muhammad Zafar Iqbal Khan
Published 2022“…The performance of the proposed routing algorithm has been evaluated through simulations of well-known software MATLAB. …”
Get full text
Get full text
Thesis
