Search Results - (( model evaluation tool algorithm ) OR ( based information based algorithm ))

Refine Results
  1. 1

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…The tool is used to evaluate the accuracy of the proposed extraction algorithm to extract the appropriate information which are needed. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Laptop price prediction using decision tree algorithm / Nurnazifah Abd Mokti by Abd Mokti, Nurnazifah

    Published 2024
    “…This research project focuses on developing a laptop price prediction model using the decision tree algorithm based on laptop specifications. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension by Affandy

    Published 2015
    “…This model is then to be used in the prototype tool development that is called 3De-ALPROV (Design Development Debug – Algorithm Program Visualization). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A simulation tool to evaluate the usability of agent centric Resource-Event-Agent (REA) database modeling methodology: The development of revenue cycle in accounting information sy... by Ming L.L.

    Published 2023
    “…REA modeling technique is very important in generating a well-structured database which will be able to affect the performance of any accounting information system. The author has implemented quantitative analysis by generating mathematical algorithms to compare efficiency between conventional and Agent Centric REA Modeling. …”
    Conference paper
  5. 5

    Haze removal algorithm using improved restoration model based on dark channel prior / Dai Zhen by Dai , Zhen

    Published 2019
    “…Based on the atmospheric physical model, this research proposed a haze removal algorithm using improved restoration model based on dark channel prior, which has good robustness to the bright sky regions, and also has a good effect on the edges. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper by Yahya, Zahrah

    Published 2016
    “…The results of the validation show a complete similarity between each original face and the output from our algorithm. Furthermore, the algorithm is also evaluated by human experts and shows 100% correctness.…”
    Get full text
    Get full text
    Thesis
  7. 7

    A survey of simulators, emulatots and testbeds for Wireless Sensor Network by Muhammad, Imran, Md Said, Abas, Hasbullah, Halabi

    Published 2010
    “…Simulators, emulators and testbeds are invaluable tools for performance evaluation of algorithms and protocols in wireless sensor networks (WSNs). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    Data-driven fractional-order PID controller tuning for liquid slosh suppression using marine predators algorithm by Mohd Zaidi, Mohd Tumari, Mohd Ashraf, Ahmad, Mohd Helmi, Suid, Mohd Riduwan, Ghazali, Shahrizal, Saat

    Published 2023
    “…The proposed data-driven tuning tool demonstrates superior performance compared to other recent metaheuristic optimization algorithms across the majority of evaluation criteria.…”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A comparative study for parameter selection in online auctions by Gan, Kim Soon

    Published 2009
    “…Self adaptation genetic algorithm is the last model that will be used to evolve the bidding strategy. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Fuzzy clustering method and evaluation based on multi criteria decision making technique by Sameer, Fadhaa Othman

    Published 2018
    “…Hence, fuzzy clustering analysis such as the Gustafson-Kessel (GK) algorithm is seen to be a very important tool in the field of credit scoring. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Model-free controller design based on simultaneous perturbation stochastic approximation by Mohd Ashraf, Ahmad

    Published 2015
    “…Here, a simultaneous perturbation stochastic approximation (SPSA) algorithm is suggested as a promising tool for the model-free control approach. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Hybrid Cat Swarm Optimization and Simulated Annealing for Dynamic Task Scheduling on Cloud Computing Environment by Gabi, Danlami, Ismail, Abdul Samad, Zainal, Anazida, Zakaria, Zalmiyah, Al-Khasawneh, Ahmad

    Published 2018
    “…A multi-objective QoS model based on execution time and execution cost criteria is presented to evaluate the efficiency of the proposed algorithm on CloudSim tool with two different datasets. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Development of an explainable machine learning model for predicting depression in adults with type 2 diabetes mellitus: a cross-sectional SHAP-based analysis of NHANES 2009-2023 by Tang, Yan, Jia, Lei, Zhou, Junjun, Dou, Jin, Qian, Jingjuan, Yi, Xin, Soh, Kim Lam

    Published 2026
    “…The deployed web-based tool enables rapid and individualized estimation of DEP risk in patients with T2DM using routinely available clinical and demographic information. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    A Novel Hybrid Deep Learning Model Based on Simulated Annealing and Cuckoo Search Algorithms for Automatic Radiomics-Based COVID-19 Diagnosis by Saleh, Basma Jumaa, Omar, Zaid, As’ari, Muhammad Amir, Bhateja, Vikrant, Izhar, Lila Iznita

    Published 2025
    “…Given that the specificity for discriminating between the causes of conventional pulmonary features is lower than its sensitivity, the primary goal of this study is to develop and evaluate a CT-based radiomics model capable of distinguishing between COVID-19 and other lung diseases. …”
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Application of machine learning and artificial intelligence in detecting SQL injection attacks by Md Sultan, Abu Bakar, Agiliga, Nwabudike Augustine, Osman, Mohd Hafeez Bin, Sharif, Khaironi Yatim

    Published 2024
    “…The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata by Hamdi, Ayman Majid

    Published 2019
    “…KD-3D-CA cryptosystem security was tested using NIST statistical tools, Avalanche test, S-Box Evaluation Tool (SET) test, performance test, and complexity test. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Topology-aware hypergraph based approach to optimize scheduling of parallel applications onto distributed parallel architectures by Koohi, Sina Zangbari

    Published 2020
    “…The existing modelling approaches capture the processor heterogeneity information in the model. …”
    Get full text
    Get full text
    Thesis