Search Results - (( model evaluation case algorithm ) OR ( based information needs algorithm ))*
Search alternatives:
- based information »
- model evaluation »
- evaluation case »
- needs algorithm »
- case algorithm »
-
1
Optimization of multipurpose reservoir operation using evolutionary algorithms / Mohammed Heydari
Published 2017“…To evaluate the hybrid algorithm, optimization of hydro-power energy of Karun dams were considered. …”
Get full text
Get full text
Get full text
Thesis -
2
Steganography based on utilizing more surrounding pixels
Published 2010“…Conventional LSB method’s concept is used as the benchmark for the proposed algorithms. A model structure selection based on not choosing selected pixels as immediate neighbors of the target pixel is proposed in this study to reduce image’s distortion made by embedding random bits or in other words to get a higher imperceptibility. …”
Get full text
Get full text
Thesis -
3
Workload performance evaluation of large spatial database for DSS based disaster management
Published 2017“…Additionally, the results of the study indicated that the prediction model for workload performance evaluation using CBR that is optimized with Hash Search technique for determining workload data on Shortest Path analysis via the employment of Dijkstra algorithm can be useful for the prediction of incoming workload based on the status of the DBMS parameters. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Measuring Enterprise Architecture / Siti Fatimah Azzahra Ibrahim
Published 2016Get full text
Get full text
Thesis -
5
Clustering of large time-series datasets using a multi-step approach / Saeed Reza Aghabozorgi Sahaf Yazdi
Published 2013“…To evaluate its accuracy, the proposed model is tested extensively by using published time-series datasets from diverse domains. …”
Get full text
Get full text
Thesis -
6
Evaluation of cloud 3D printing services oriented toward the product life cycle based on a triangular fuzzy number complementary judgment matrix
Published 2024“…Within this contextual framework, we have crafted a sophisticated credit evaluation algorithm and model tailored explicitly for cloud 3D printing service providers. …”
Get full text
Get full text
Get full text
Article -
7
High-Resolution Downscaling with Interpretable Relevant Vector Machine: Rainfall Prediction for Case Study in Selangor
Published 2024“…The Principal Component Analysis (PCA) technique was employed to choose relevant environmental variables as input for the machine learning model, and various imputation methods were utilized to manage missing data, such as mean imputation and the KNN algorithm. To assess the performance of the RVM-based rainfall model, we collected a dataset from the Department of Irrigation and Drainage Malaysia. …”
Get full text
Get full text
Article -
8
Robust image watermarking based on Dual Intermediate Significant Bit (DISB)
Published 2014“…In most applications, the watermarking algorithm embeds the watermark have to be robust against possible attacks and keep the quality of the host media as possible. …”
Get full text
Get full text
Get full text
Proceeding Paper -
9
Modelling of head movement in expression of disgust
Published 2010“…The thesis proposes spline-based function named Joint Cubic Bezier (JCB) to model neck motion during disgust. …”
Get full text
Get full text
Thesis -
10
Classification and visualization of e-commerce product reviews comparison using support vector machine / Nuwairah Aimi Ahmad Kushairi
Published 2023“…It means a significant difference exists between the time taken for manual evaluation and the evaluation using the web-based system. …”
Get full text
Get full text
Thesis -
11
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Afterward evolutionary algorithm (EA) was employed to prioritize test cases based on the rate severity of fault detection per unit test cost. …”
Get full text
Get full text
Thesis -
12
Technical efficiency performance of Malaysian public research universities: Fuzzy data envelopment analysis / Saber Abdelall Mohamed Ahmed
Published 2023“…By utilizing Fuzzy DEA (FDEA) model with algorithm, this study observes the PRUMs efficiency status during the study period and the expected average efficiency for the next 2021/2022 academic year. …”
Get full text
Get full text
Get full text
Thesis -
13
Hybrid Artificial Bees Colony algorithms for optimizing carbon nanotubes characteristics
Published 2018“…Chemical Vapor Deposition (CVD) is the most efficient method for CNTs production.However,using CVD method encounters crucial issues such as customization,time and cost.Therefore,Response Surface Methodology (RSM) is proposed for modeling and the ABC-βHC is proposed for optimization purpose to address such issues.The selected CNTs characteristics are CNTs yield and quality represented by the ratio of the relative intensity of the D and G-bands (ID/IG).Six case studies are generated from collected dataset including four cases of CNTs yield and one case of ID/IG as single objective optimization problems,while the sixth case represents multi-objective problem.The input parameters of each case are a subset from the set of input parameters including reaction temperature,duration,carbon dioxide flow rate,methane partial pressure,catalyst loading,polymer weight and catalyst weight.The models for the first three case studies were mentioned in the original work.RSM is proposed to develop polynomial models for the output responses in the other three cases and to identi significant process parameters and interactions that could affect the CNTs output responses.The developed models are validated using t-test,correlation and pattern matching.The predictive results have a good agreement with the actual experimental data.The models are used as objective functions in optimization techniques.For multi-objective optimization,this study proposes Desirability Function Approach (DFA) to be integrated with other proposed algorithms to form hybrid techniques namely RSM-DFA,ABC-DFA and ABC-βHC-DFA.The proposed algorithms and other selected well-known algorithms are evaluated and compared on their CNTs yield and quality.The optimization results reveal that ABC-βHC and ABC-βHC-DFA obtained significant results in terms of success rate,required time,iterations,and function evaluations number compared to other well-known algorithms.Significantly,the optimization results from this study are better than the results from the original work of the collected dataset.…”
Get full text
Get full text
Get full text
Thesis -
14
Identification of non-linear dynamic systems using fuzzy system with constrained membership functions
Published 2004“…In this study, the identification performance of the SFS trained by the back-propagation (BP) algorithm forms the basis of comparison when evaluations were made on the performance of the newly proposed CFS models. …”
Get full text
Get full text
Get full text
Thesis -
15
Implementation of AES algorithm into information investigation autopsy (IIA) / Ahmad Wafiy Hamad Zaki
Published 2013“…Information Investigation Autopsy (IIA) is the tools that can captured the information needed on the Local Area Network environment and later needed to be secured, the IIA need a module that can to secure the evidence captured from any harm. …”
Get full text
Get full text
Student Project -
16
Unifying the evaluation criteria of many objectives optimization using fuzzy Delphi method
Published 2021“…Lastly, the most suitable criteria outcomes are formulated in the unifying model and evaluate by experts to verify the appropriateness and suitability of the model in assessing the MaOO algorithms fairly and effectively.…”
Get full text
Get full text
Article -
17
Deep learning in public health: Comparative predictive models for COVID-19 case forecasting
Published 2024“…These models were calibrated and evaluated using a comprehensive dataset that includes confirmed case counts, demographic data, and relevant socioeconomic factors. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Agent-based extraction algorithm for computational problem solving
Published 2015“…The tool is used to evaluate the accuracy of the proposed extraction algorithm to extract the appropriate information which are needed. …”
Get full text
Get full text
Thesis -
20
Modelling and environmental assessment of heterogeneous catalysis biodiesel process using war algorithm
Published 2013Get full text
Get full text
Undergraduates Project Papers
