Search Results - (( model implication from algorithm ) OR ( based information based algorithm ))
Search alternatives:
- model implication »
- based information »
- information based »
- implication from »
- from algorithm »
-
1
Using predictive analytics to solve a newsvendor problem / S. Sarifah Radiah Shariff and Hady Hud
Published 2023“…Practical implications In terms of managerial implications, the findings in this research help to frame the adoption of a more advanced analytical approach to forecasting, using a Machine Learning algorithm, in solving a newsvendor problem. …”
Get full text
Get full text
Book Section -
2
Predicting the classification of heart failure patients using optimized machine learning algorithms
Published 2025“…Model selection was further refined using information criteria, including Akaike Information Criterion (AIC) and Bayesian Information Criterion (BIC), ensuring that the best-performing model was chosen based on both predictive accuracy and model complexity. …”
Get full text
Get full text
Get full text
Article -
3
Prediction models of heritage building based on machine learning / Nur Shahirah Ja'afar
Published 2021“…These algorithms were developed by using prewar shophouses dataset from 2004 until 2018 based on factors of heritage properties. …”
Get full text
Get full text
Thesis -
4
XAIRF-WFP: a novel XAI-based random forest classifier for advanced email spam detection
Published 2024“…However, these algorithms often suffer from the "black box" dilemma, a lack of transparency that hinders their applicability in security contexts where understanding the reasoning behind classifications is essential for effective risk assessment and mitigation strategies. …”
Get full text
Get full text
Get full text
Article -
5
An investigation of structural breaks on spot and futures crude palm oil returns
Published 2011“…The implications of omitting structural break in volatility clustering modelling process are largely discussed in various developed macroeconomic and finance variables. …”
Get full text
Get full text
Article -
6
Why coding? Why now? From coding to computational thinking through computational mathematics problem based learning (CM-PBL)
Published 2019“…Computational thinking is essential to computing and information science (i.e., algorithmically, with or without the assistance of computers) to solve problems with solutions that are reusable in different contexts. …”
Get full text
Get full text
Conference or Workshop Item -
7
In silico approaches for unearthing bacterial quorum-sensing inhibitors against pathogenic bacteria
Published 2019“…Thus, certain group of researchers also developed machine learning tools based on support vector machine (SVM) and hidden Markov models (HMM) for the identification of novel and effective biofilm inhibitory peptides (BIPs), while others used in silico approaches for predicting and designing of antibiofilm peptides usingbidirectional recursive neural network (BRNN) and Random Forest (RF) algorithms. …”
Get full text
Get full text
Book Section -
8
A review on the graphical user authentication algorithm : recognition-based and recall-based.
Published 2013“…User authentication has become an important consideration in information security as traditional password-based schemes are constantly subjected to attacks. …”
Get full text
Get full text
Article -
9
Government policy as a key moderator to contractors’ risk attitudes among Malaysian construction companies
Published 2020“…Partial least square-SEM is an appropriate analysis that was used to assess the results in the current research because its algorithm permits the unrestricted computation of cause-effect relationship models that use both reflective and formative measurement models. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
Get full text
Get full text
Thesis -
11
Agent-based extraction algorithm for computational problem solving
Published 2015“…The results show that the extraction algorithm has been able to extract 100 % of the information correctly. …”
Get full text
Get full text
Thesis -
12
MGR: An Information Theory Based Hierarchical Divisive Clustering Algorithm for Categorical Data
Published 2014“…This research proposes mean gain ratio (MGR), a new information theory based hierarchical divisive clustering algorithm for categorical data. …”
Get full text
Get full text
Get full text
Article -
13
Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan
Published 2014“…El-gamal encryption system is an asymmetric key encryption algorithm which is based on the Diffie-Hellman key exchange. …”
Get full text
Get full text
Thesis -
14
Adaptive intelligence job online scheduling within dynamic grid environment based on gridsim
Published 2008“…Additionally, the provided common information from Grid Information Service (GIS) and an arrival new job are calculated by Fuzzy C-Means (FCM) algorithm in order· to evaluate the current status of resources and groups of arrival jobs. …”
Get full text
Get full text
Article -
15
-
16
A new algorithm on Graphical User Authentication (GUA) based on multi-line grids
Published 2010“…Thereafter a comparative analysis of all Recall-Based algorithms based on attack patterns of graphical user authentication is tabulated. …”
Get full text
Get full text
Get full text
Article -
17
An adaptive density-based method for clustering evolving data streams / Amineh Amini
Published 2014“…This study proposes a density-based algorithm for clustering evolving data streams. …”
Get full text
Get full text
Get full text
Thesis -
18
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
Get full text
Get full text
Get full text
Article -
19
Algorithms for extracting adjacency matrix based on Formal Concept Analysis (FCA)
Published 2017“…The desire to achieve a holistic representation of Information Retrieval (IR) with the aim for a human-oriented form of representation has spurred the growth of concept-based IR search techniques such as the Semantic Web technology. …”
Get full text
Get full text
Conference or Workshop Item -
20
Channel quality information (CQI) reporting algorithms in LTE-A
Published 2016“…The simulation results show that the average CQI reporting algorithm produced more compromising results than the automated CQI reporting algorithm and the average RB-based CQI reporting algorithm…”
Get full text
Get full text
Get full text
Get full text
Article
