Search Results - (( model validation method algorithm ) OR ( rate evaluation method algorithm ))*
Search alternatives:
- validation method »
- method algorithm »
- rate evaluation »
-
1
Standardizing and weighting the evaluation criteria of many-objective optimization competition algorithms based on fuzzy delphi and fuzzy-weighted zero-inconsistency methods
Published 2021“…The evaluation criteria of Many Objective Optimization algorithm (MaOO) play a critical role in evaluating the competition MaOO algorithms. …”
Get full text
Get full text
Thesis -
2
Parameter extraction of photovoltaic module using hybrid evolutionary algorithm
Published 2023Conference Paper -
3
Optimisation of Environmental Risk Assessment Architecture using Artificial Intelligence Techniques
Published 2024“…Two methods were used to validate the proposed architecture, that is, the analytical method was used to validate the neuro-fuzzy risk assessment model and the safe path selection model, whereas the experimental method was used to evaluate the prototype. …”
thesis::doctoral thesis -
4
Hybrid Artificial Bees Colony algorithms for optimizing carbon nanotubes characteristics
Published 2018“…Chemical Vapor Deposition (CVD) is the most efficient method for CNTs production.However,using CVD method encounters crucial issues such as customization,time and cost.Therefore,Response Surface Methodology (RSM) is proposed for modeling and the ABC-βHC is proposed for optimization purpose to address such issues.The selected CNTs characteristics are CNTs yield and quality represented by the ratio of the relative intensity of the D and G-bands (ID/IG).Six case studies are generated from collected dataset including four cases of CNTs yield and one case of ID/IG as single objective optimization problems,while the sixth case represents multi-objective problem.The input parameters of each case are a subset from the set of input parameters including reaction temperature,duration,carbon dioxide flow rate,methane partial pressure,catalyst loading,polymer weight and catalyst weight.The models for the first three case studies were mentioned in the original work.RSM is proposed to develop polynomial models for the output responses in the other three cases and to identi significant process parameters and interactions that could affect the CNTs output responses.The developed models are validated using t-test,correlation and pattern matching.The predictive results have a good agreement with the actual experimental data.The models are used as objective functions in optimization techniques.For multi-objective optimization,this study proposes Desirability Function Approach (DFA) to be integrated with other proposed algorithms to form hybrid techniques namely RSM-DFA,ABC-DFA and ABC-βHC-DFA.The proposed algorithms and other selected well-known algorithms are evaluated and compared on their CNTs yield and quality.The optimization results reveal that ABC-βHC and ABC-βHC-DFA obtained significant results in terms of success rate,required time,iterations,and function evaluations number compared to other well-known algorithms.Significantly,the optimization results from this study are better than the results from the original work of the collected dataset.…”
Get full text
Get full text
Get full text
Thesis -
5
Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms
Published 2020“…Secondly, the modeling method of the proposed PV module is validated by experimental data. …”
Get full text
Get full text
Thesis -
6
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…It involves development of Max-Min Rule-Based Classification Algorithm. The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. …”
Get full text
Get full text
Thesis -
7
A new intelligent multilayer framework for insider threat detection
Published 2021“…The selection procedure has been developed based on the integration of the entropy-VIKOR methods. For the second layer, a hybrid insider threat detection method has been proposed, where the Misuse Insider Threat Detection (MITD) model has been created using the random forest algorithm. …”
Get full text
Get full text
Get full text
Article -
8
Evaluations of oil palm fresh fruit bunches maturity degree using multiband spectrometer
Published 2017“…Furthermore, the Lazy-IBK algorithm have been validated to produce the best classifier model, with the machine learning algorithm performance of 65.26%, recall of 65.3%, and 65.4% F-measured as compared to other evaluated machine learning classifier algorithms proposed within the WEKA data mining algorithm. …”
Get full text
Get full text
Get full text
Thesis -
9
Development of a new robust hybrid automata algorithm based on surface electromyography (SEMG) signal for instrumented wheelchair control
Published 2020“…Based on algorithm evaluation, it shows that one control method couldn’t fit to all persons as per proven in method selection experiment. …”
Get full text
Get full text
Thesis -
10
Extended multiple models selection algorithms based on iterative feasible generalized least squares (IFGLS) and expectation-maximization (EM) algorithm
Published 2019“…In conclusion, SURE(IFGLS)-Autometrics and SURE(EM)-Autometrics can be used as models selection algorithms. Additionally, both algorithms are suitable in improving performance of automated models selection procedures. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Identification of non-equilibrium growth for bitcoin exchange rate: mathematical derivation method in Islamic financial engineering
Published 2017“…Crptocurrency is a type of digital currency that using decentralized method for validating transaction. In the same time, the user of the Bitcoin is protected using hash algorithm. …”
Get full text
Get full text
Get full text
Article -
12
-
13
Optimizing high-density aquaculture rotifer Detection using deep learning algorithm
Published 2022“…In this paper, we present the method and performance to detect rotifer Brachionus plicatilis in 1ml sample automatically using deep learning algorithm YOLOv3. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
14
Ischemic Stroke Detection System With Computer Aided Diagnostic Capability
Published 2017“…The best result is achieved by the sinusoidal modelling method with high genuine acceptance rate at 84.2% and low false rejection rate of 33.14%. …”
Get full text
Get full text
Monograph -
15
Heart disease prediction using artificial neural network with ADAM optimization and harmony search algorithm
Published 2025“…This performance is validated through rigorous comparative assessments against various classification algorithms and state-of-the-art methods, revealing notable advantages in terms of predictive precision, computational efficiency, and adaptability to real-world clinical scenarios. …”
Get full text
Get full text
Get full text
Article -
16
Flood susceptibility analysis and its verification using a novel ensemble support vector machine and frequency ratio method
Published 2015“…For model validation, area under curve method was used and both success and prediction rate curves were calculated. …”
Get full text
Get full text
Get full text
Article -
17
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
18
Dental Age Estimation Using a Convolutional Neural Network Algorithm on Panoramic Radiographs: A Pilot Study in Indonesia
Published 2025journal::journal article -
19
-
20
Deep Learning Based image segmentation for expensive soil desiccation crack recognition and qualification
Published 2025“…Crack images obtained were processed and annotated to produce a dataset of 820 images for the training and testing of deep learning models. Deep learning models, including U-Net, Res-UNet, and DeepLabv3+ with pre-trained backbones such as MobileNetV2, ResNet-18, ResNet-50, and Xception, were trained and evaluated along side a traditional Otsu's thresholding method as the baseline for crack detection and segmentation. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
