Search Results - (( model validation method algorithm ) OR ( user evaluation model algorithm ))
Search alternatives:
- validation method »
- method algorithm »
- user evaluation »
- model algorithm »
-
1
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
2
Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper
Published 2016“…The algorithm is validated by conducting manual ground truth and the results were compared with the closest and well-known methods. …”
Get full text
Get full text
Thesis -
3
Extended multiple models selection algorithms based on iterative feasible generalized least squares (IFGLS) and expectation-maximization (EM) algorithm
Published 2019“…In conclusion, SURE(IFGLS)-Autometrics and SURE(EM)-Autometrics can be used as models selection algorithms. Additionally, both algorithms are suitable in improving performance of automated models selection procedures. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Self-calibration algorithm for a pressure sensor with a real-time approach based on an artificial neural network
Published 2018“…To verify the proposed model’s capability to build a self-calibration algorithm, the model was tested using an untrained input data set. …”
Get full text
Get full text
Get full text
Article -
5
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
6
-
7
Comparison of Some Numerical Methods for Solving Real-Life Nonlinear Equations by Using Python Programming / Annie Gorgey ... [et al.]
Published 2024“…The study suggests extending investigations to Algorithm 1 refinement, comparative studies on various equation types, exploration of hybrid methods, real-world application and validation, and user-friendly implementation.…”
Get full text
Get full text
Get full text
Article -
8
Real time self-calibration algorithm of pressure sensor for robotic hand glove system
Published 2019“…The model was tested using an untrained input data set in order to verify the Proposed model’s capability for implementing a self-calibration algorithm. …”
Get full text
Get full text
Thesis -
9
Text spam messages classification using Artificial Immune System (AIS) algorithms
Published 2024thesis::master thesis -
10
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
11
Leaf condition analysis using convolutional neural network and vision transformer
Published 2024“…The model performance is evaluated and compared with the other methods to ensure quality and usage compatibility in the plantation domain. …”
Get full text
Get full text
Get full text
Article -
12
Predictive modeling of condominium prices using a Particle Swarm Optimization-Random Forest approach / Che Wan Sufia Che Wan Samsudin
Published 2025“…Essential phases of the project include data collection, data preprocessing, and the implementation of the Particle Swarm Optimization-Random Forest price prediction algorithm. Both simulated and real-world experiments are used as a basis to rigorously test and validate the predictive capability of the model. …”
Get full text
Get full text
Thesis -
13
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
14
From Employees to Entrepreneurs: A Qualitative Exploration of Career Transitions in Ghana
Published 2025“…KMS validation was carried out through expert assessment, and the user acceptance of the KMS was evaluated using a survey method, which adopted a questionnaire from the Technology Acceptance Model (TAM) framework. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Identification of non-equilibrium growth for bitcoin exchange rate: mathematical derivation method in Islamic financial engineering
Published 2017“…Crptocurrency is a type of digital currency that using decentralized method for validating transaction. In the same time, the user of the Bitcoin is protected using hash algorithm. …”
Get full text
Get full text
Get full text
Article -
16
An Artificial Intelligence-Based Knowledge Management System for Outcome-Based Education Implementing in Higher Education Institutions
Published 2025“…KMS validation was carried out through expert assessment, and the user acceptance of the KMS was evaluated using a survey method, which adopted a questionnaire from the Technology Acceptance Model (TAM) framework. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Ischemic Stroke Detection System With Computer Aided Diagnostic Capability
Published 2017“…The first method is sinusoidal modelling method where the frequency spectrum were inspected to search for the frequency components with high magnitude. …”
Get full text
Get full text
Monograph -
18
Discrete simulation framework for wireless cellular networks.
Published 2008“…In order to evaluate and validate the performance of the designed simulator, a simulation model for the wireless cellular network and mobile environment deployed. …”
Get full text
Get full text
Article -
19
Development of a novel natural frequencies prediction tool for laminated composite plates using integrated artificial neural network (ANN) - simulink MATLAB / Mohd Arif Mat Norman
Published 2024“…The study conducted 16 case studies, and the program's predictions were validated using analytical methods and compared to FE modal results. …”
Get full text
Get full text
Thesis -
20
Development of a systematic method in lean tool selection for automotive industry
Published 2012“…Furthermore, based on the results of the current research, a modified VIKOR method was developed. It is noteworthy to state that the suggested model for lean tool selection (defined in software) was validated within a panel of experts and companies indicating the effectiveness and usefulness of the model. …”
Get full text
Get full text
Thesis
