Search Results - (( normal evaluation method algorithm ) OR ( variable extractions _ algorithm ))

Refine Results
  1. 1
  2. 2

    Automated detection and evaluation of ischemic stroke on ct brain imaging using machine learning techniques by Sharuddin, Nur Amirah Atikah

    Published 2025
    “…This study investigates the application of machine learning algorithms for the detection of ischemic stroke using CT brain images. …”
    Get full text
    Get full text
    Monograph
  3. 3

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…In SPHAD,statistical analysis is used to construct a normal profile using statistical formula, scoring the incoming packets, and computing the relationships between historic normal behaviour as a dependent variable against observable packet behaviours as the independent variable through linear regression. …”
    Get full text
    Get full text
    Thesis
  4. 4

    The normalized random map of gradient for generating multifocus image fusion by Ismail, ., Kamarul Hawari, Ghazali

    Published 2020
    “…It successes to eliminate the mathematical and algorithm problems. Furthermore, the evaluation of proposed method based on the fused image quality. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid by Yazid, Mariam Azwa

    Published 2015
    “…This research evaluates the performance of three different symmetric cryptography algorithms. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream by Abdulateef, Alaa Fareed

    Published 2023
    “…The results indicate that the AGMB algorithm outperformed existing benchmark algorithms in terms of predefined evaluation criteria with an overall 72% accuracy compared to benchmark algorithms which is 11 % only. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    The effect of dose calculation algorithms on the normal tissue complication probability values of thoracic cancer by Ahmad, Noor Ashikin

    Published 2015
    “…Four treatment plans are created and DVHs are evaluated based on criteria of acceptance level. NTCP values for thorax plan one and two are evaluated by using different algorithm. …”
    Get full text
    Get full text
    Monograph
  8. 8

    Application of genetic algorithm methods to optimize flowshop sequencing problem by Mohd Fadil, Md Sairi

    Published 2008
    “…Genetic algorithm method is methods that follow the natural concept. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9

    Classification for large number of variables with two imbalanced groups by Ahmad Hakiim, Jamaluddin

    Published 2020
    “…This study proposed two algorithms of classification namely Algorithm 1 and Algorithm 2 which combine resampling, variable extraction, and classification procedure. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Analysis of tumour control probability, normal tissue complication probability and isotoxic effects for prostate cancer by Fauzee, Nurnada Syahrain Mohd

    Published 2016
    “…Variation in evaluation method will not give similar findings even same data is used. …”
    Get full text
    Get full text
    Monograph
  11. 11

    Dynamic robust bootstrap method based on LTS estimators by Midi, Habshah, Uraibi, Hassan Sami, Al-Talib, Bashar Abdul Aziz Majeed

    Published 2009
    “…In order to make reliable inferences about the parameters of a model, require that the parameter estimates are normally distributed. Nevertheless, in real situations, many estimates are not normal and the use of bootstrap method is more appropriate as it does not rely on the normality assumption. …”
    Get full text
    Get full text
    Article
  12. 12

    Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier by Siow, Shien Loong

    Published 2018
    “…Firstly, the 1D-LBP algorithm is used to extract the features of the normalized iris images and save the data in a text file according to the subject and the combinations to evaluate for the next stage. …”
    Get full text
    Get full text
    Monograph
  13. 13
  14. 14
  15. 15

    A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network by Mohammad Azmi Ridwan, Dr.

    Published 2023
    “…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. The research is divided into three parts, which are (1) dataset development, (2) algorithm development, and (3) algorithm performance evaluation. …”
    text::Thesis
  16. 16
  17. 17

    A selective approach for energy-aware video content adaptation decision-taking engine in android based smartphone by Ismail, Mohd Norasri

    Published 2019
    “…Subjective evaluation by selected respondents are also has been made using Absolute Category Rating method as recommended by ITU to evaluate EnVADE algorithm in term of QoE. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    A selective approach for energy-aware video content adaptation decision-taking engine in android based smartphone by Abd Rahim, Mohd Hilmi Izwan

    Published 2019
    “…Subjective evaluation by selected respondents are also has been made using Absolute Category Rating method as recommended by ITU to evaluate EnVADE algorithm in term of QoE. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    A clustering-based method for outlier detection under concept drift by Tahir, Mahjabeen, Abdullah, Azizol, Udzir, Nur Izura, Kasmiran, Khairul Azhar

    Published 2024
    “…However, challenges may arise from assuming the majority of data comprises normal instances, particularly during sudden spikes in attack data, potentially diminishing algorithm effectiveness. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Improving the evaluation performance of space-time trellis code through visualisation by Harun, Harlisya, Ungku Chulan, Ungku Azmi Iskandar, Khazani, Khamizon

    Published 2011
    “…By comparing it with the enhancement strategy that was discovered via the normal approach (i.e., by analysing algorithm) it was discovered that visualisation had inspired an entirely different pruning technique that outperformed the common approach by 20%. …”
    Get full text
    Get full text
    Conference or Workshop Item