Search Results - (( model evaluation ((a algorithm) OR (_ algorithm)) ) OR ( based information needs algorithm ))

Refine Results
  1. 1

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…The tool is used to evaluate the accuracy of the proposed extraction algorithm to extract the appropriate information which are needed. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Formulating new enhanced pattern classification algorithms based on ACO-SVM by Alwan, Hiba Basim, Ku-Mahamud, Ku Ruhana

    Published 2013
    “…ACO originally deals with discrete optimization problem.In applying ACO for solving SVM model selection problem which are continuous variables, there is a need to discretize the continuously value into discrete values.This discretization process would result in loss of some information and hence affects the classification accuracy and seeking time.In this algorithm we propose to solve SVM model selection problem using IACOR without the need to discretize continuous value for SVM.The second algorithm aims to simultaneously solve SVM model selection problem and selects a small number of features.SVM model selection and selection of suitable and small number of feature subsets must occur simultaneously because error produced from the feature subset selection phase will affect the values of SVM model selection and result in low classification accuracy.In this second algorithm we propose the use of IACOMV to simultaneously solve SVM model selection problem and features subset selection.Ten benchmark datasets were used to evaluate the proposed algorithms.Results showed that the proposed algorithms can enhance the classification accuracy with small size of features subset.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Optimization of multipurpose reservoir operation using evolutionary algorithms / Mohammed Heydari by Mohammed , Heydari

    Published 2017
    “…One of the main problems of this method is premature convergence and to improve this problem, the compound of the particle swarm algorithm and genetic algorithm were evaluated. The basis of this compound is in such a way that the advantages of the Particle Swarm Optimization (PSO) algorithm and Genetic Algorithm (GA) have been applied simultaneously. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper by Yahya, Zahrah

    Published 2016
    “…Feature extraction is a preliminary step before 3D reconstruction and therefore, a junction detection algorithm is proposed. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    Jogging activity recognition using k-NN algorithm by Afifah Ismail

    Published 2022
    “…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  11. 11

    A comparative study for parameter selection in online auctions by Gan, Kim Soon

    Published 2009
    “…Self adaptation genetic algorithm is the last model that will be used to evolve the bidding strategy. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Efficient management of Top-k queries over Uncertain Data Streams with dynamic Sliding Window Model by Raja Wahab, Raja Azhan Syah

    Published 2024
    “…Current research on tackling uncertainty revolves around creating specifically tailored algorithms that can operate in the presence of value uncertainty using both a count-based and a time-based approach. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Efficient DNS based Load Balancing for Bursty Web Application Traffic by Chin, Mei Lu, Chong, Eng Tan, Mohamad Imran, Bin Bandan

    Published 2012
    “…The proposed algorithm is evaluated via computer simulation and modeling where its performance is verified against the few selected algorithms of the same nature. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Book recommendation system using content-based filtering / Amalin Aliesya Mohd Azmi by Mohd Azmi, Amalin Aliesya

    Published 2023
    “…With the help of Book Recommendation System, we can offer a solution by utilizing algorithms to suggest books based on a reader’s interests. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension by Affandy

    Published 2015
    “…This model is then to be used in the prototype tool development that is called 3De-ALPROV (Design Development Debug – Algorithm Program Visualization). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Steganography based on utilizing more surrounding pixels by Afrakhteh, Masoud

    Published 2010
    “…Conventional LSB method’s concept is used as the benchmark for the proposed algorithms. A model structure selection based on not choosing selected pixels as immediate neighbors of the target pixel is proposed in this study to reduce image’s distortion made by embedding random bits or in other words to get a higher imperceptibility. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Construction and optimization of financial risk management model based on financial data and text data influencing information system by Hui Huang, Thien Sang Lim

    Published 2024
    “…This study found financial and non-financial data models more predictive. Qualitative textual informationis used in financial risk assessment to improve risk prediction algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Influence maximisation towards target users and minimal diffusion of information based on information needs by Temitope, Olanrewaju Abdus-Samad

    Published 2020
    “…IDTU was developed on greedy approach by using graph sketches to improve the selection of influencers that maximize influence spread to a set of target users. Moreover, the influencer identification based on specific needs was implemented using a General Additive Model on four fundamental centralities. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Furniture form innovation and human–machine comfort evaluation model based on genetic algorithm by Yifan, Bai, Kamarudin, Khairul Manami, Alli, Hassan

    Published 2024
    “…This research explores the Pareto-primarily based Genetic Algorithm (PGA) inside this framework, with the goal of fostering innovation in product layout and the generation of novel ideas. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20