Search Results - (( data evaluation study algorithm ) OR ( parallel optimization path algorithm ))

Refine Results
  1. 1

    Tool path generation of contour parallel based on ant colony optimisation by Abdullah, Haslina, Ramli, Rizauddin, Abd Wahab, Dzuraidah, Abu Qudeiri, Jaber

    Published 2016
    “…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib by Dian Najihah , Abu Talib

    Published 2019
    “…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors by Lee, Weng Fook

    Published 2008
    “…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
    Get full text
    Thesis
  6. 6

    A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks by Chien, Stephen Lim Een, Raja Maamor Shah, Raja Noor Farah Azura, Othman, Mohamed

    Published 2016
    “…A tree visualisation was constructed based on its connectivity to enable the generation of formulae for optimal diameter and average optimal path lengths. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Performance evaluation of caching placement algorithms in named data network for video on demand service by Abbas, Rasha Salem

    Published 2016
    “…The purpose of this study is to evaluate the performance of caching placement algorithms (LCD, LCE, Prob, Pprob, Cross, Centrality, and Rand) in Named Data Network (NDN) for Video on Demand (VoD). …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Performance evaluation for different data encryption algorithms on wireless sensor network (WSN) by Mhawesh, Thoalfekarali Zuhair

    Published 2018
    “…The results of evaluation AES, SF and SIT algorithms in terms of encrypted data size (bytes) showed that, the SIT algorithm produce the lowest size for all encrypted Images which is below 90250bytes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Analysis of string matching compression algorithms by Nadarajan, Krishnaveny, Ahmad Zukarnain, Zuriati

    Published 2008
    “…This project evaluates the performance of the compression algorithms in order to increase the performance of memory access. …”
    Get full text
    Get full text
    Article
  12. 12

    LCSS-Based Algorithm for Computing Multivariate Data Set Similarity: A Case Study of Real-Time WSN Data by Khan, Rahim, Ali, Ihsan, Altowaijri, Saleh, Zakarya, Muhammad, Rahman, Atiq Ur, Ahmedy, Ismail, Khan, Anwar, Gani, Abdullah

    Published 2019
    “…Our evaluation suggests that the proposed algorithm can be approximately 39.9% more efficient than its counterparts for various data sets in terms of computational time.…”
    Get full text
    Get full text
    Article
  13. 13

    Hybrid performance measures and mixed evaluation method for data classification problems by Hossin, Mohammad

    Published 2012
    “…Second, this study evaluates the current evaluation practices for evaluating and comparing the two performance measures. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Multistep forecasting for highly volatile data using new algorithm of Box-Jenkins and GARCH by Siti Roslindar, Yaziz, Roslinazairimah, Zakaria

    Published 2018
    “…This study is proposing a new algorithm of Box-Jenkins and GARCH (or BJ-G) in evaluating the multistep forecasting performance of the BJ-G model for highly volatile time series data. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Validation on an enhanced dendrite cell algorithm using statistical analysis by Mohamad Mohsin, Mohamad Farhan, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Abd Wahab, Mohd Helmy

    Published 2017
    “…Evaluating a novel or enhanced algorithm is compulsory in data mining studies in order to measure it has superior performance than its previous version. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Sentiment analysis for malay newspaper (SAMNews) using negative selection algorithm / Nur Amalina Redzuan by Redzuan, Nur Amalina

    Published 2013
    “…This project is implemented based on five phases in methodology part which consists of background study, data collection and preparation, prototype design, prototype development and evaluation and dociunentation. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Evaluation of Lightning Current Using Inverse Procedure Algorithm. by Ab Kadir, Mohd Zainal Abidin, Izadi, Mahdi, Askari, Mohamad Tolou, Hajikhani, Maryam

    Published 2013
    “…In this study an inverse procedure algorithm is proposed in the time domain to evaluate lightning return stroke current based on measured electromagnetic fields at an observation point. …”
    Get full text
    Get full text
    Article
  18. 18

    Sentiment analysis of domestic violence prediction using Naive Bayes algorithm / Nurulizzah Mohd Rahiman by Mohd Rahiman, Nurulizzah

    Published 2024
    “…The research objectives focus on studying and applying the Naive Bayes algorithm for sentiment analysis on tweets related to domestic violence, aiming to provide insights for researchers, government agencies, policymakers, and the public and develop a prediction model using Naive Bayes algorithm to evaluate its performance. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Evaluating machine learning algorithms for sentiment analysis: a comparative study to support data-driven decision making by Mohamad Daud, Nur Hafiza, Shafii, Nor Hayati, Md Nasir, Diana Sirmayunie, Fauzi, Nur Fatihah

    Published 2025
    “…The primary objective is to assess the performance of these models across various domains and datasets in sentiment analysis tasks. The study employs data from the IMDb 500k movie reviews dataset, utilizing machine learning techniques for sentiment classification. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Analytical Study Of Machine Learning Models For Stock Trading In Malaysian Market by Hazirah Halul

    Published 2024
    “…Therefore, this study focused to contribute on evaluating different algorithm models such as traditional ML and deep learning models with big stock data of multiple parameters from selected companies in Bursa Malaysia. …”
    thesis::master thesis