Search Results - (( new evaluation tool algorithm ) OR ( identification _ based algorithm ))
Search alternatives:
- evaluation tool »
- new evaluation »
- tool algorithm »
-
1
Identification of non-linear dynamic systems using fuzzy system with constrained membership functions
Published 2004“…Main research directions in this field include the complexity reduction of fuzzy models models, structure identification of fuzzy system, and application of new or improved training algorithms. …”
Get full text
Get full text
Get full text
Thesis -
2
Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper
Published 2016“…The results of the validation show a complete similarity between each original face and the output from our algorithm. Furthermore, the algorithm is also evaluated by human experts and shows 100% correctness.…”
Get full text
Get full text
Thesis -
3
Comparative Study of Weighted Product–Dijkstra’s Algorithm and All Possible Path Approach Based on Multiple Criteria and Multi-Dimensions
Published 2020“…Weighted product method was one of the algorithms in Multi-Criteria Decision Making (MCDM) that was used to combine multiple criteria into new scores for further evaluation. …”
Get full text
Get full text
Get full text
Article -
4
Hybrid genetic random forest algorithm for the identification of ISI-indexed articles / Mohammadreza Moohebat
Published 2017“…In order to measure performance of the proposed algorithm, evaluation was done by several independent UCI datasets and the results were compared with RF and some individual classifiers. …”
Get full text
Get full text
Get full text
Thesis -
5
Reassembly and clustering bifragmented intertwined jpeg images using genetic algorithm and extreme learning machine
Published 2019“…It is applied to three datasets namely DFRWS (2006 and 2007) forensic challenges datasets and a new dataset to test and evaluate the AJC tool. These datasets have complex challenges that simulate particular fragmentation cases addressed in this research. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
A security payment model for financial payment using mykad
Published 2011“…However, if attack or intrusion is detected in less than 30 minutes, ARSA will automatically change the security algorithm to a new one. The evaluation of the MPM performance is measured with HP LoadRunner testing tools from which it is found that the response time of MPM with multithreading is better compared to the single thread model and credit card authorisation system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Software-Defined Radio-Based Modulation and Demodulation Scheme
Published 2009“…Software Defined Radio (SDR) has been one of the new techniques developed to change the way the traditional wireless communication systems work. …”
Get full text
Get full text
Thesis -
8
Bottleneck-based heuristic for permutation flowshop scheduling
Published 2017“…The heuristic performance was evaluated based on the average makespan ratio, average percentage error, and percentage of solution performance obtained. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
Get full text
Get full text
Thesis -
10
Autonomous self-exam monitoring for early diabetes detection
Published 2020“…This project comprises of three stages which are pre-processing, processing and post processing stage. The designed tool convert an iris image into new picture using image processing algorithms and analyses some changes in colour pattern and lastly diagnose whether it is diabetic or non-diabetic iris. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
The conceptual framework of knowledge of large scale and incomplete graphs of skyline queries optimization using machine learning
Published 2025“…The preliminary results using the K means Clustering Algorithm showed that the conceptual framework successfully grouped similar data points, facilitating the identification of skyline points. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji
Published 2018“…Then the new rotation angle is used to detect bleeding in the patient and evaluate the performance of the new algorithm. …”
Get full text
Get full text
Thesis -
13
Recursive Subspace Identification Algorithm Using The Propagator Based Method
Published 2017“…In this paper, the recursive subspace identification algorithm based on the propagator method which avoids the SVD computation is proposed. …”
Get full text
Get full text
Get full text
Article -
14
Low-level hybridization scripting language with dynamic parameterization in PSO-GA / Suraya Masrom
Published 2015“…In the scripting language evaluation, nine LLHs and three single PSO algorithms have been successfully created using the scripting languages. …”
Get full text
Get full text
Thesis -
15
Hybrid DE-PEM algorithm for identification of UAV helicopter
Published 2014“…Practical implications – The identification algorithm is expected to facilitate the required model development for model-based control design for autonomous helicopter development. …”
Get full text
Get full text
Get full text
Article -
16
Smoothed functional algorithm with norm-limited update vector for identification of continuous-time fractional-order Hammerstein Models
Published 2024“…In particular, the standard smoothed functional algorithm (SFA) based method is modified by implementing a limit function in the update vector of the standard SFA based method to solve the issue of high tendency of divergence during the identification process. …”
Get full text
Get full text
Get full text
Article -
17
Evaluate the performance of university timetabling problem with various artificial intelligence techniques
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…A deterministic mutation-based algorithm is introduced to overcome this problem. …”
Get full text
Get full text
Get full text
Article -
19
A new fuzzy peer assessment methodology for cooperative learning of students
Published 2015“…The outcomes clearly demonstrate that the proposed fuzzy peer assessment methodology can be deployed as an effective evaluation tool for cooperative learning of students.…”
Get full text
Get full text
Get full text
Article -
20
Identification of continuous-time hammerstein system using sine cosine algorithm
Published 2019“…This paper presents the development of identification of continuous-time Hammerstein systems based on Sine Cosine Algorithm (SCA). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
