Search Results - (( pre evaluation _ algorithm ) OR ( its application based algorithm ))
Search alternatives:
- application based »
- its application »
- pre evaluation »
-
1
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…Evaluation was made based on various evaluation metrics related to outlier detection and clustering quality. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
A soft hierarchical algorithm for the clustering of multiple bioactive chemical compounds
Published 2007“…The performance of the algorithm is evaluated on two bench mark datasets and a large dataset of compound structures derived from MDL MDDR database. …”
Get full text
Get full text
Get full text
Book Section -
3
Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio...
Published 2023“…Comparing this developed algorithm with other algorithms shows its superiority in multi-objective optimization (MOO) evaluation metrics. …”
Get full text
Get full text
Thesis -
4
DEEP LEARNING ALGORITHM IMPLEMENTATION FOR SHIP DETECTION IN SPOT SATELLITE IMAGES
Published 2019“…The implementation of the algorithm consists of three stages which are pre-processing, network training and accuracy evaluation. …”
Get full text
Get full text
Final Year Project -
5
Investigation of evolutionary multi-objective algorithms in solving view selection problem / Seyed Hamid Talebian
Published 2013“…As a comparative study, the performance of the algorithms was evaluated based on various standard metrics. …”
Get full text
Get full text
Thesis -
6
Optimization Of Two-Dimensional Dual Beam Scanning System Using Genetic Algorithms
Published 2008“…The main motivation for this research is to introduce and evaluate an advance new customized GA. Comparison results of different combinatorial operators, and tests with different probability factors are shown. …”
Get full text
Get full text
Thesis -
7
Wavelet-based pre-filtering for low cost inertial sensors
Published 2010Get full text
Get full text
Get full text
Article -
8
Inverse problem in image processing: Image restoration
Published 2023“…However, DIP requires a pre-defined early stopping, which can limit its practical applications. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems
Published 2019“…Due to the problem of the unmodeled dynamics, there is a significant disparity between the theory of control and its actual applications, which makes the model-based controller difficult to apply. …”
Get full text
Get full text
Thesis -
10
Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems
Published 2019“…Due to the problem of the unmodeled dynamics, there is a significant disparity between the theory of control and its actual applications, which makes the model-based controller difficult to apply. …”
Get full text
Get full text
Thesis -
11
Penilaian esei berbantukan komputer menggunakan teknik Bayesian dan pengunduran linear berganda
Published 2006“…Disagreement of grade given by two human judges, time consuming and high evaluation cost became a reason of research on Computer-based Assessment System (CbAS) been studied. …”
Get full text
Get full text
Thesis -
12
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
13
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Microcrack Detection And Noise Reduction In Integrated Circuit Packages
Published 2018“…Three algorithms are tested and evaluated in terms of microcrack detection and noise reduction which are probability based thresholding, histogram equalization, and modified Perona-Malik’s anisotropic diffusion methods. …”
Get full text
Get full text
Monograph -
15
Songket pattern classification using backpropagation neural network / Nik Aidil Syawalni Nik Mazlan
Published 2024“…The study's outcomes underscore the capability of the BPNN-based algorithm to attain remarkable accuracy in Songket pattern classification, thus showcasing its viability for real-world applications.…”
Get full text
Get full text
Thesis -
16
Classification of Emphysema Patterns in Computed Tomography Based On Gabor Filter
Published 2015“…The proposed emphysema classification algorithm involves four aspects, image pre-processing, feature extraction, matching (classification), and decision making. …”
Get full text
Get full text
Final Year Project -
17
Design, development and performance optimization of a new artificial intelligent controlled multiple-beam optical scanning module
Published 2006“…The main motivation for this study is to introduce and evaluate an advance new customized GA. Comparison results of different combinatorial operators and tests with different probability factors are shown. …”
Get full text
Get full text
Get full text
Article -
18
Multi leader particle swarm optimization for optimal placement and sizing of multiple distributed generation for a micro grid
Published 2023“…In addition, the solutions have been evaluated based on pre-defined performance metrics and the outcomes of the optimization framework were compared with the other existing optimization techniques to evaluate the potency and the productivity of the developed MLPSO algorithm. …”
text::Thesis -
19
Instruction Set Extension Of A Low-End Reconfigurable Microcontroller In Bit-Sorting Implementation
Published 2018“…It was found that the ISA extension from 12-bit to 16-bit has produced a faster execution time with fewer resource utilization when implementing the bit-sorting algorithm. The overall development process used in this research is flexible enough for further investigation either by extending its module to more complex algorithms or evaluating other designs of its components.…”
Get full text
Get full text
Get full text
Article -
20
Uncertainty estimation for improving accuracy of non-rigid registration in cardiac images
Published 2015“…In other words, uncertainty estimation is used to evaluate the registration algorithm performance which integrates intensity-based and feature-based methods. …”
Get full text
Get full text
Get full text
Book Section
