Search Results - (( java application using algorithm ) OR ( based evaluation metric algorithm ))
Search alternatives:
- evaluation metric »
- java application »
- based evaluation »
- metric algorithm »
- using algorithm »
-
1
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
2
Batch mode heuristic approaches for efficient task scheduling in grid computing system
Published 2016“…We simulate our proposed algorithms using a Java based simulator that is purposedly built for Grid computing simulations. …”
Get full text
Get full text
Get full text
Thesis -
3
Performance evaluation metrics for multi-objective evolutionary algorithms in search-based software engineering: systematic literature review
Published 2021“…Most of them either focused on solving newly re-formulated problems or on proposing new approaches, while a number of studies performed reviews and comparative studies on the performance of proposed algorithms. To evaluate such performance, it is necessary to consider a number of performance metrics that play important roles during the evaluation and comparison of investigated algorithms based on their best-simulated results. …”
Get full text
Get full text
Article -
4
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The performance of KSFaci is evaluated using a four-factor evaluation metrics covering the user profile preciseness, recommendation service, staff directory and document repository. …”
Get full text
Get full text
Thesis -
5
A Systematic Literature Review of Machine Learning Methods for Short-term Electricity Forecasting
Published 2023Conference Paper -
6
Evaluation of Visual Network Algorithms on Historical Documents
Published 2020“…Therefore, for a new document, evaluation of algorithms is ineluctable. The study also proposed a simple but reliable cluster evaluation metric called NPL-C metric. …”
Get full text
Get full text
Get full text
Thesis -
7
Role Minimization As An Optimization Metric In Role Mining Algorithms : A Literature Review
Published 2018“…A recent access control model that could accommodate a dynamic structure such as cloud computing can be recognized as role based access control and the role management process of this access control can be identified as role mining.The current trend in role based access control is the role mining problem that can be described as the difficulty to uncover an optimum set of roles from the userpermission assignment.To solve this problem,the researchers have proposed role mining algorithms to produce role set and among the existing algorithms there is an intrinsic topic of the common perception to evaluate the goodness of the generated role set.Eventually,the value of the identified roles could be measured by the preferred metric of optimality namely the number of roles,sizes of userassignment and permission-assignment and Weighted Structural Complexity.Until now, there is some disagreement on the optimization metric but notably many researchers have agreed on the minimization of the number of roles as a solid metric.This paper discusses an overview of the current state-of-the-art on the recent role mining algorithms that focus on role minimization as an optimization metric to evaluate the goodness of the identified roles. …”
Get full text
Get full text
Get full text
Article -
8
-
9
Validation on an enhanced dendrite cell algorithm using statistical analysis
Published 2017“…This study demonstrates the mechanism of evaluating an enhanced algorithm using performance metrics and validated it using statistical analysis. …”
Get full text
Get full text
Get full text
Article -
10
LCSS-Based Algorithm for Computing Multivariate Data Set Similarity: A Case Study of Real-Time WSN Data
Published 2019“…Several non-metric-based algorithms are available in the literature, the most robust and reliable one is the dynamic programming-based technique. …”
Get full text
Get full text
Article -
11
Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms
Published 2016“…The latest effort to solve this selection problem is the development of the metrics selection model that uses genetic algorithm (GA). …”
Get full text
Get full text
Thesis -
12
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
13
-
14
Multiobjective deep reinforcement learning for recommendation systems
Published 2022“…The approaches were evaluated with movie recommendation dataset by using three conflicting metrics, namely precision, novelty, and diversity. …”
Get full text
Get full text
Article -
15
Multi-objective deep reinforcement learning for recommendation systems
Published 2022“…The approaches were evaluated with movie recommendation dataset by using three conflicting metrics, namely precision, novelty, and diversity. …”
Get full text
Get full text
Article -
16
Evaluation of the Transfer Learning Models in Wafer Defects Classification
Published 2022“…Three defects categories and one non-defect were chosen for this evaluation. The key metrics for the evaluation are classification accuracy, classification precision and classification recall. 855 images were used to train and test the algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
18
An intermediate significant bit (ISB) watermarking technique using neural networks
Published 2016“…Many researchers have used these approaches to evaluate their algorithms. These strategies have been used for a long time, however, which unfortunately limits the value of PSNR and NCC in reflecting the strength and weakness of the watermarking algorithms. …”
Get full text
Get full text
Article -
19
-
20
A Systematic Literature Review of Electricity Load Forecasting using Long Short-Term Memory
Published 2023Conference Paper
