Search Results - (( pre evaluation _ algorithm ) OR ( its application based algorithm ))

Refine Results
  1. 1

    Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream by Abdulateef, Alaa Fareed

    Published 2023
    “…Evaluation was made based on various evaluation metrics related to outlier detection and clustering quality. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    A soft hierarchical algorithm for the clustering of multiple bioactive chemical compounds by Salim, Naomie, Shah, J. Z.

    Published 2007
    “…The performance of the algorithm is evaluated on two bench mark datasets and a large dataset of compound structures derived from MDL MDDR database. …”
    Get full text
    Get full text
    Get full text
    Book Section
  3. 3

    Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio... by Daba, Layth Muwafaq Abdulhussein

    Published 2023
    “…Comparing this developed algorithm with other algorithms shows its superiority in multi-objective optimization (MOO) evaluation metrics. …”
    Get full text
    Get full text
    Thesis
  4. 4

    DEEP LEARNING ALGORITHM IMPLEMENTATION FOR SHIP DETECTION IN SPOT SATELLITE IMAGES by HANIZAM, MOHD HAZIQ NAZMI

    Published 2019
    “…The implementation of the algorithm consists of three stages which are pre-processing, network training and accuracy evaluation. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Investigation of evolutionary multi-objective algorithms in solving view selection problem / Seyed Hamid Talebian by Talebian, Seyed Hamid

    Published 2013
    “…As a comparative study, the performance of the algorithms was evaluated based on various standard metrics. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Optimization Of Two-Dimensional Dual Beam Scanning System Using Genetic Algorithms by Koh, Johnny Siaw Paw

    Published 2008
    “…The main motivation for this research is to introduce and evaluate an advance new customized GA. Comparison results of different combinatorial operators, and tests with different probability factors are shown. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Inverse problem in image processing: Image restoration by Wong, Yen Khai

    Published 2023
    “…However, DIP requires a pre-defined early stopping, which can limit its practical applications. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems by Nor Sakinah, Abdul Shukor

    Published 2019
    “…Due to the problem of the unmodeled dynamics, there is a significant disparity between the theory of control and its actual applications, which makes the model-based controller difficult to apply. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems by Nor Sakinah, Abdul Shukor

    Published 2019
    “…Due to the problem of the unmodeled dynamics, there is a significant disparity between the theory of control and its actual applications, which makes the model-based controller difficult to apply. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Penilaian esei berbantukan komputer menggunakan teknik Bayesian dan pengunduran linear berganda by Mohamad @ Hamza, Mohd. Azwan

    Published 2006
    “…Disagreement of grade given by two human judges, time consuming and high evaluation cost became a reason of research on Computer-based Assessment System (CbAS) been studied. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Microcrack Detection And Noise Reduction In Integrated Circuit Packages by Koh, Ye Sheng

    Published 2018
    “…Three algorithms are tested and evaluated in terms of microcrack detection and noise reduction which are probability based thresholding, histogram equalization, and modified Perona-Malik’s anisotropic diffusion methods. …”
    Get full text
    Get full text
    Monograph
  15. 15

    Songket pattern classification using backpropagation neural network / Nik Aidil Syawalni Nik Mazlan by Nik Mazlan, Nik Aidil Syawalni

    Published 2024
    “…The study's outcomes underscore the capability of the BPNN-based algorithm to attain remarkable accuracy in Songket pattern classification, thus showcasing its viability for real-world applications.…”
    Get full text
    Get full text
    Thesis
  16. 16

    Classification of Emphysema Patterns in Computed Tomography Based On Gabor Filter by Tengku Azis, Tengku Mohd Syamim

    Published 2015
    “…The proposed emphysema classification algorithm involves four aspects, image pre-processing, feature extraction, matching (classification), and decision making. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Design, development and performance optimization of a new artificial intelligent controlled multiple-beam optical scanning module by Koh, Johnny Siaw Paw, Aris, Ishak, Ramachandaramurthy, Vigna Kumaran, Bashi, Sinan Mahmod, Marhaban, Mohammad Hamiruce

    Published 2006
    “…The main motivation for this study is to introduce and evaluate an advance new customized GA. Comparison results of different combinatorial operators and tests with different probability factors are shown. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Multi leader particle swarm optimization for optimal placement and sizing of multiple distributed generation for a micro grid by Ariya Sinhalage Buddhika Eshan Karunarathne

    Published 2023
    “…In addition, the solutions have been evaluated based on pre-defined performance metrics and the outcomes of the optimization framework were compared with the other existing optimization techniques to evaluate the potency and the productivity of the developed MLPSO algorithm. …”
    text::Thesis
  19. 19

    Instruction Set Extension Of A Low-End Reconfigurable Microcontroller In Bit-Sorting Implementation by Salim, Sani Irwan, Soo, Yew Guan, Samsudin, Sharatul Izah

    Published 2018
    “…It was found that the ISA extension from 12-bit to 16-bit has produced a faster execution time with fewer resource utilization when implementing the bit-sorting algorithm. The overall development process used in this research is flexible enough for further investigation either by extending its module to more complex algorithms or evaluating other designs of its components.…”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Uncertainty estimation for improving accuracy of non-rigid registration in cardiac images by Mazaheri, Samaneh, Sulaiman, Puteri Suhaiza, Wirza, Rahmita, Dimon, Mohd Zamrin, Khalid, Fatimah, Tayebi, Rohollah Moosavi

    Published 2015
    “…In other words, uncertainty estimation is used to evaluate the registration algorithm performance which integrates intensity-based and feature-based methods. …”
    Get full text
    Get full text
    Get full text
    Book Section