Search Results - (( java application using algorithm ) OR ( based evaluation metric algorithm ))

Refine Results
  1. 1

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Batch mode heuristic approaches for efficient task scheduling in grid computing system by Maipan-Uku, Jamilu Yahaya

    Published 2016
    “…We simulate our proposed algorithms using a Java based simulator that is purposedly built for Grid computing simulations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Performance evaluation metrics for multi-objective evolutionary algorithms in search-based software engineering: systematic literature review by Nuh, Jamal Abdullahi, Koh, Tieng Wei, Baharom, Salmi, Osman, Mohd Hafeez, Kew, Si Na

    Published 2021
    “…Most of them either focused on solving newly re-formulated problems or on proposing new approaches, while a number of studies performed reviews and comparative studies on the performance of proposed algorithms. To evaluate such performance, it is necessary to consider a number of performance metrics that play important roles during the evaluation and comparison of investigated algorithms based on their best-simulated results. …”
    Get full text
    Get full text
    Article
  4. 4

    An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing by Mohd Sharef, Nurfadhlina

    Published 2006
    “…The performance of KSFaci is evaluated using a four-factor evaluation metrics covering the user profile preciseness, recommendation service, staff directory and document repository. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Evaluation of Visual Network Algorithms on Historical Documents by Khairunnisa, Binti Ibrahim

    Published 2020
    “…Therefore, for a new document, evaluation of algorithms is ineluctable. The study also proposed a simple but reliable cluster evaluation metric called NPL-C metric. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Role Minimization As An Optimization Metric In Role Mining Algorithms : A Literature Review by Ahmad, Rabiah, Abd Hamid, Nazirah, Selamat, Siti Rahayu

    Published 2018
    “…A recent access control model that could accommodate a dynamic structure such as cloud computing can be recognized as role based access control and the role management process of this access control can be identified as role mining.The current trend in role based access control is the role mining problem that can be described as the difficulty to uncover an optimum set of roles from the userpermission assignment.To solve this problem,the researchers have proposed role mining algorithms to produce role set and among the existing algorithms there is an intrinsic topic of the common perception to evaluate the goodness of the generated role set.Eventually,the value of the identified roles could be measured by the preferred metric of optimality namely the number of roles,sizes of userassignment and permission-assignment and Weighted Structural Complexity.Until now, there is some disagreement on the optimization metric but notably many researchers have agreed on the minimization of the number of roles as a solid metric.This paper discusses an overview of the current state-of-the-art on the recent role mining algorithms that focus on role minimization as an optimization metric to evaluate the goodness of the identified roles. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Validation on an enhanced dendrite cell algorithm using statistical analysis by Mohamad Mohsin, Mohamad Farhan, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Abd Wahab, Mohd Helmy

    Published 2017
    “…This study demonstrates the mechanism of evaluating an enhanced algorithm using performance metrics and validated it using statistical analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    LCSS-Based Algorithm for Computing Multivariate Data Set Similarity: A Case Study of Real-Time WSN Data by Khan, Rahim, Ali, Ihsan, Altowaijri, Saleh, Zakarya, Muhammad, Rahman, Atiq Ur, Ahmedy, Ismail, Khan, Anwar, Gani, Abdullah

    Published 2019
    “…Several non-metric-based algorithms are available in the literature, the most robust and reliable one is the dynamic programming-based technique. …”
    Get full text
    Get full text
    Article
  11. 11

    Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms by Bakar, Abubakar Diwani

    Published 2016
    “…The latest effort to solve this selection problem is the development of the metrics selection model that uses genetic algorithm (GA). …”
    Get full text
    Get full text
    Thesis
  12. 12

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  13. 13
  14. 14

    Multiobjective deep reinforcement learning for recommendation systems by Ee, Yeo Keat, Mohd Sharef, Nurfadhlina, Yaakob, Razali, Kasmiran, Khairul Azhar, Marlisah, Erzam, Mustapha, Norwati, Zolkepli, Maslina

    Published 2022
    “…The approaches were evaluated with movie recommendation dataset by using three conflicting metrics, namely precision, novelty, and diversity. …”
    Get full text
    Get full text
    Article
  15. 15

    Multi-objective deep reinforcement learning for recommendation systems by Keat, Ee Yeo, Mohd Sharef, Nurfadhlina, Yaakob, Razali, Kasmiran, Khairul Azhar, Marlisah, Erzam, Mustapha, Norwati, Zolkepli, Maslina

    Published 2022
    “…The approaches were evaluated with movie recommendation dataset by using three conflicting metrics, namely precision, novelty, and diversity. …”
    Get full text
    Get full text
    Article
  16. 16

    Evaluation of the Transfer Learning Models in Wafer Defects Classification by Jessnor Arif, Mat Jizat, Anwar, P. P. Abdul Majeed, Ahmad Fakhri, Ab. Nasir, Zahari, Taha, Yuen, Edmund, Lim, Shi Xuen

    Published 2022
    “…Three defects categories and one non-defect were chosen for this evaluation. The key metrics for the evaluation are classification accuracy, classification precision and classification recall. 855 images were used to train and test the algorithms. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18

    An intermediate significant bit (ISB) watermarking technique using neural networks by Zeki, A., Abubakar, A., Chiroma, H.

    Published 2016
    “…Many researchers have used these approaches to evaluate their algorithms. These strategies have been used for a long time, however, which unfortunately limits the value of PSNR and NCC in reflecting the strength and weakness of the watermarking algorithms. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20