Search Results - (( model evaluation upon algorithm ) OR ( based applications based algorithm ))*

Refine Results
  1. 1

    Segmentation of MRI brain images using statistical approaches by Balafar, Mohammad Ali

    Published 2011
    “…Therefore, these algorithms can be improved upon. A neighbourhood-based noise-reduction algorithm which uses the edges of an image is proposed. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream by Abdulateef, Alaa Fareed

    Published 2023
    “…Evaluation was made based on various evaluation metrics related to outlier detection and clustering quality. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    A cluster analysis of population based cancer registry in Brunei Darussalam : an exploratory study by Lai, Daphne Teck Ching, Owais A. Malik

    Published 2022
    “…Six distinct demographic subgroups were consistently found by three algorithms while model-based clustering solution were not considered for deeper analysis as highly imbalanced clusters were produced. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    The classification of wink-based eeg signals by means of transfer learning models by Jothi Letchumy, Mahendra Kumar

    Published 2021
    “…It was demonstrated from the simulation investigation that the CWT model could yield a better signal transformation amongst the preprocessing algorithms. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR) by Chowdhury Sajadul Islam

    Published 2026
    “…Python 3.13 is used for dataset processing and EPDL model building. Upon converting PE files to images, the deep learning pixel-matching algorithm identifies obscured malware features. …”
    thesis::doctoral thesis
  7. 7
  8. 8

    A review of slicing techniques in software engineering by Shah, Asadullah, Raza, Ali, Hassan, Basri, Shah, Abdul Salam

    Published 2015
    “…A common practice now is to extract the sub models out of the giant models based upon the slicing criteria. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Dynamic investment model for the restructed power market in the presence of wind source by Esfahani, Mohammad Tolou Askari Sedehi

    Published 2014
    “…The uncertainties of the output power of wind turbine generators are modelled based upon the scenario-based method and data mining techniques. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Evaluation of Security Metric for Artificial Internet of Things Smart Locking System by Siti Nur Hanani, Mohd Rizal

    Published 2023
    “…This thesis outlines the architectural model of the smart locking system, the design of the face recognition algorithm, and the development of face recognition reader using the Raspberry Pi 3 model B microcontroller. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11
  12. 12

    Artifact identification for blood pressure and photoplethysmography signals in an unsupervised environment / Lim Pooi Khoon by Lim , Pooi Khoon

    Published 2020
    “…The robustness of this artifact detection algorithm was then evaluated on both short and continuous data collected from young and older subjects which included arrhythmia patients. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Performance evaluation on quantized weight for convolutional neural network based object detection by Putra, Mohd Hasbullah

    Published 2021
    “…The grid cell parameter value of the system is varied to evaluate its effectiveness and ability in detecting small size objects upon deployment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Forecasting of PM2.5 in Malaysia using hybrid artificial neural network / Pavithra Chinatamby by Pavithra , Chinatamby

    Published 2023
    “…All these models were evaluated based on the highest R2 value and lowest RMSE, MAE and MAPE values obtained. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    3D imaging techniques in documentation of cultural assets in Malaysia by Md. Sharif, Harlina, Hazumi, Hazman, Saedin, Nurfarhanah

    Published 2015
    “…In recent years, however, advent of computer vision (CV) algorithms make it possible to reconstruct 3D geometry of objects by using image sequences from digital cameras, which are then processed by web services and freeware applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    A new security framework to prevent denial of service and replay attacks for IEEE 802.11 wireless networks by Malekzadeh, Mina

    Published 2011
    “…The ACF-non-cryptographic countermeasure proposes a lightweight security model without involving cryptographic algorithms. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Power prediction using the wind turbine power curve and data-driven approaches / Ehsan Taslimi Renani by Ehsan Taslimi , Renani

    Published 2018
    “…In this thesis, a new parametric model, called modified hyperbolic tangent (MHTan), is proposed to approximate the wind turbine power curve. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Application of clustering in managing unstructured textual data in relational database / Wael Mohamed Shaher Yafooz by Yafooz, Wael Mohamed Shaher

    Published 2014
    “…Their name entities and top most frequent terms are selected for the factors used in a cluster assignment. The model is tested and evaluated by embedding it in a component-based package of a relational databases internal structure. …”
    Get full text
    Get full text
    Thesis
  19. 19

    3D documenatation of the petalaindera: Digital heritage preservation methods using 3D laser scanner and photogrammetry by Md Sharif, Harlina, Hazumi, Hazman, Meli, Rafiq Hafizuddin

    Published 2018
    “…In recent years, however, the advent of computer vision (CV) algorithms make it possible to reconstruct 3D geometry of objects by using image sequences from digital cameras, which are then processed by web services and freeware applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    3D documentation of the Petalaindera: digital heritage preservation methods using 3D laser scanner and photogrammetry by Md. Sharif, Harlina, Hazumi, Hazman, Meli, Rafiq Hafizuddin

    Published 2017
    “…In recent years, however, the advent of computer vision (CV) algorithms make it possible to reconstruct 3D geometry of objects by using image sequences from digital cameras, which are then processed by web services and freeware applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper