Search Results - (( new evaluation methods algorithm ) OR ( based information system algorithm ))*

Refine Results
  1. 1

    Content-based recommender system for an academic social network / Vala Ali Rohani by Vala Ali, Rohani

    Published 2014
    “…In this study, a new algorithm is proposed to represent an enhanced version of content-based recommender systems by utilizing social networking features. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Taguchi-Grey Relational Analysis Method for Parameter Tuning of Multi-objective Pareto Ant Colony System Algorithm by Muthana, Shatha Abdulhadi, Ku Mahamud, Ku Ruhana

    Published 2023
    “…The gray relational grade (GRG) performance metric and the Friedman test were used to evaluate the algorithm’s performance. The Taguchi-GRA method that produced the new values for the algorithm’s parameters was shown to be able to provide a better multi-objective generator maintenance scheduling (GMS) solution. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Evaluation of the effectiveness of clustering algorithm in retrieving Malay documents / Aminah Mahmood by Mahmood, Aminah

    Published 2004
    “…This study has evaluated and identified the effectiveness of clustering algorithm in Malay document retrieval system using Hadith test collections, which consists of Hadith documents, relevant judgments and one set of queries. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Wide area measurement system in the IEEE-14 bus system using multiobjective shortest path algorithm for fault analysis by Awalin, Lilik J., Syahirah, Abd Halim, Jafferi, Jamaludin, Nor Azuana, Ramli

    Published 2021
    “…The IEEE-14 bus system was modeled in PSCAD software for simulating nineteen types of fault based on multi-objective shortest path algorithm. To manage the wide area measurement, the research must comprehend the working principle of the multi-objective shortest path algorithm, whereby the proposed method will determine the new path for the IEEE-14 bus system. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Use of web page credibility information in increasing the accuracy of web-based question answering systems / Asad Ali Shah by Asad, Ali Shah

    Published 2017
    “…This research proposes a credibility assessment algorithm for evaluating Web pages and using their credibility score for ranking answers in Web-based QA systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Feature selection methods application towards a new dataset based on online student activities / Muhammad Hareez Mohd Zaki ... [et al.] by Mohd Zaki, Muhammad Hareez, Abdul Aziz, Mohd Azri, Sulaiman, Suhana, Hambali, Najidah

    Published 2023
    “…In addition, the availability of data from various academic information management systems in recent years had been increasing, causing classification to become a technique that is in demand by the educational institutes. …”
    Get full text
    Get full text
    Article
  8. 8

    A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network by Mohammad Azmi Ridwan, Dr.

    Published 2023
    “…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
    text::Thesis
  9. 9
  10. 10

    Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier by Siow, Shien Loong

    Published 2018
    “…Secondly, the K-NN classifier is used to classify the 1D-LBP based features from the first stage. There are two methods to evaluate the features, which are one versus one and one versus many. …”
    Get full text
    Get full text
    Monograph
  11. 11

    Old Jawi manuscript: Digital recognition / Zaidi Razak by Zaidi, Razak

    Published 2016
    “…The literature review in this research looks at works conducted in the past on line and character segmentation as well as recognition systems. The information gathered is useful for the development of a line segmentation algorithm, a new character segmentation algorithm, as well as a recognition algorithm which is based on the use of a unique code and Hamming distance calculation. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Adaptive method to improve web recommendation system for anonymous users by Almurtadha, Yahya Mohammed

    Published 2011
    “…The second is Adaptive Web page Recommendation System (AWRS) which combines the classification algorithm of iPACT in addition to the ability of adaptive recommending due to the changes of the users‟ interests and weighting methods to deal with unvisited or new added pages. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper by Yahya, Zahrah

    Published 2016
    “…The algorithm is validated by conducting manual ground truth and the results were compared with the closest and well-known methods. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…The dropping decision of the redundant RREQ in the NCPR algorithm completely relies on preset variables, such variables require to be set by the system administrator based on the scenario. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    A novel framework for identifying twitter spam data using machine learning algorithms by Maziku, Susana Boniphace, Abdul Rahiman, Amir Rizaan, Muhammed, Abdullah, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…Previous studies have approached spam detection as a classification problem, high dimension, time-consuming problem, which requires new methods to address the problems. This study introduces a novel framework for identifying Twitter spam data based on machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map by Emmanuel Oluwatobi Asani, Godsfavour Biety-Nwanju, Abidemi Emmanuel Adeniyi, Salil Bharany, Ashraf Osman Ibrahim Elsayed, Anas W. Abulfaraj, Wamda Nagmeldin

    Published 2023
    “…The study provides a new chaos-based method and extends the application of the probabilistic approach to the domain of symmetric key image encryption. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Design, development and performance optimization of a new artificial intelligent controlled multiple-beam optical scanning module by Koh J.S.P., Aris I.B., Ramachandaramurthy V.K., Bashi S.M., Marhaban M.H.

    Published 2023
    “…This research presents a new approach to optimise the performance of a multiple-beam optical scanning system in terms of its marking combinations and speed, using Genetic Algorithm (GA). …”
    Article
  19. 19

    Design, development and performance optimization of a new artificial intelligent controlled multiple-beam optical scanning module by Koh J.S.P., Aris I.B., Ramachandaramurthy V.K., Bashi S.M., Marhaban M.H.

    Published 2023
    “…This research presents a new approach to optimise the performance of a multiple-beam optical scanning system in terms of its marking combinations and speed, using Genetic Algorithm (GA). …”
    Article
  20. 20

    A New Monotone Fuzzy Rule Relabeling Framework With Application to Failure Mode and Effect Analysis Methodology by Tay, Kai Meng, Pang, Lie Meng, Lim, Chee Peng, Ishibuchi, Hisao

    Published 2020
    “…A monotone fuzzy rule relabeling (MFRR) algorithm has been introduced previously for tackling the issue of a non-monotone fuzzy rule base in the Takagi-Sugeno-Kang (TSK) Fuzzy Inference System (FIS). …”
    Get full text
    Get full text
    Get full text
    Article