Search Results - (( java application customization algorithm ) OR ( _ evaluation model algorithm ))
Search alternatives:
- customization algorithm »
- java application »
- model algorithm »
-
1
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
2
Evaluation of MLP-ANN Training Algorithms for Modeling Soil Pore-Water Pressure Responses to Rainfall
Published 2013“…The performance of four artificial neural network (ANN) training algorithms was evaluated to identify the training algorithm appropriate for modeling the dynamics of soil pore-water pressure responses to rainfall patterns using multilayer perceptron (MLP) ANN. …”
Get full text
Get full text
Citation Index Journal -
3
Neural Networks Ensemble: Evaluation of Aggregation Algorithms for Forecasting
Published 2013“…The outputs from the individual NN models were combined by four different aggregation algorithms in NNs ensemble. …”
Get full text
Get full text
Thesis -
4
Diagnosis and recommender system for diabetes patient using decision tree / Nurul Aida Mohd Zamary
Published 2024“…To evaluate the model, the model accuracy, precision, recall, F1- score, and confusion matrix were used. …”
Get full text
Get full text
Thesis -
5
Analytical Study Of Machine Learning Models For Stock Trading In Malaysian Market
Published 2024“…Therefore, this study focused to contribute on evaluating different algorithm models such as traditional ML and deep learning models with big stock data of multiple parameters from selected companies in Bursa Malaysia. …”
thesis::master thesis -
6
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. …”
Get full text
Get full text
Get full text
Thesis -
7
Unifying the evaluation criteria of many objectives optimization using fuzzy Delphi method
Published 2021“…Lastly, the most suitable criteria outcomes are formulated in the unifying model and evaluate by experts to verify the appropriateness and suitability of the model in assessing the MaOO algorithms fairly and effectively.…”
Get full text
Get full text
Article -
8
-
9
Evaluation of the Transfer Learning Models in Wafer Defects Classification
Published 2022Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Neural network ensemble: Evaluation of aggregation algorithms in electricity demand forecasting
Published 2013“…These algorithms include equal-weights combination of Best NN models, combination of trimmed forecasts, and Bayesian Model Averaging (BMA). …”
Get full text
Get full text
Conference or Workshop Item -
11
Neural network ensemble: Evaluation of aggregation algorithms in electricity demand forecasting
Published 2013“…These algorithms include equal-weights combination of Best NN models, combination of trimmed forecasts, and Bayesian Model Averaging (BMA). …”
Get full text
Get full text
Conference or Workshop Item -
12
Neural network ensemble: Evaluation of aggregation algorithms in electricity demand forecasting
Published 2013“…These algorithms include equal-weights combination of Best NN models, combination of trimmed forecasts, and Bayesian Model Averaging (BMA). …”
Get full text
Get full text
Conference or Workshop Item -
13
Multistep forecasting for highly volatile data using new algorithm of Box-Jenkins and GARCH
Published 2018“…The study of the multistep ahead forecast is significant for practical application purposes using the proposed statistical model. This study is proposing a new algorithm of Box-Jenkins and GARCH (or BJ-G) in evaluating the multistep forecasting performance of the BJ-G model for highly volatile time series data. …”
Get full text
Get full text
Conference or Workshop Item -
14
Evaluation of different peak models of eye blink EEG for signal peak detection using artificial neural network
Published 2016“…This study evaluates the performance of eye blink EEG signal peak detection algorithm for four different peak models which are Dumpala's, Acir's, Liu's, and Dingle's peak models. …”
Get full text
Get full text
Article -
15
Dynamic Bayesian networks and variable length genetic algorithm for designing cue-based model for dialogue act recognition
Published 2010“…The model is evaluated against two previously proposed models and the results confirm the potentiality of dynamic Bayesian networks for dialogue act recognition. …”
Get full text
Get full text
Article -
16
Evaluation Of Different Peak Models Of Eye Blink Eeg For Signal Peak Detection Using Artificial Neural Network
Published 2016“…This study evaluates the performance of eye blink EEG signal peak detection algorithm for four different peak models which are Dumpala’s, Acir’s, Liu’s, and Dingle’s peak models. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Real-time slicing algorithm for Stereolithography (STL) CAD model applied in additive manufacturing industry
Published 2018“…This paper evaluates a real-time slicing algorithm for slicing an STL formatted computer-aided design (CAD). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
-
19
Performance evaluation of state-of-the-art 2D face recognition algorithms on real and synthetic masked face datasets
Published 2023“…On a larger-scale dataset MLFW, the impact of mask-wearing on FR models was also up to 50%. We trained and evaluated a proposed Mask Face Recognition (MFR) model whose performance is much better than the SOTA algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Ringed seal search for global optimization via a sensitive search model / Younes Saadi
Published 2018“…The proposed algorithm is characterized by a search model namely the sensitive search model, where the exploitation-exploration is adaptively balanced. …”
Get full text
Get full text
Get full text
Thesis
