Search Results - (( pre evaluation means algorithm ) OR ( data distribution from algorithm ))*

Refine Results
  1. 1

    Development of an effective clustering algorithm for older fallers by Goh, Choon Hian, Wong, Kam Kang, Tan, Maw Pin *, Ng, Siew Cheok, Chuah, Yea Dat, Kwan, Ban Hoe

    Published 2022
    “…The proposed algorithm was developed through the stages of: data pre-processing, feature identification and extraction with either t-Distributed Stochastic Neighbour Embedding (t-SNE) or principal component analysis (PCA)), clustering (K-means clustering, Hierarchical clustering, and Fuzzy C-means clustering) and characteristics interpretation with statistical analysis. …”
    Get full text
    Get full text
    Article
  2. 2

    An enhanced synthetic oversampling framework with self-supervised contrastive learning for multi-class image imbalance by Xiaoling, Gao

    Published 2025
    “…Traditional synthetic oversampling methods, while helpful, often fail to address the complexities of real-world data with uneven class distributions. The first contribution of this study is the creation of artificially imbalanced datasets from CIFAR10 and SVHN datasets, designed to systematically evaluate classifier performance under varying degrees of class disparity. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Simulation model algorithm for pre-hospital emergency care (PHEC) volunteers in Indonesia by Martono, Martono, Sudiro, Sudiro, Satino, Satino

    Published 2018
    “…Algorithm models for PHEC simulation have some strengths in real setting and effective interactive learning to evaluate the capabilities of first responders in managing pre-hospital emergency, and improve problem-solving skills, as well as their performance in such aspects as skill, knowledge, and attitude.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    A Hybrid Least Squares Support Vector Machine with Bat and Cuckoo Search Algorithms for Time Series Forecasting by Mohammed, Athraa Jasim, Ghathwan, Khalil Ibrahim, Yusof, Yuhanis

    Published 2020
    “…Five evaluation metrics were utilized; mean average percent error (MAPE), accuracy, symmetric mean absolute percent error (SMAPE), root mean square percent error (RMSPE) and fitness value. …”
    Get full text
    Get full text
    Article
  5. 5

    A soft hierarchical algorithm for the clustering of multiple bioactive chemical compounds by Salim, Naomie, Shah, J. Z.

    Published 2007
    “…The results of the algorithm show significant improvement in comparison to a similar implementation of the hard c-means algorithm.…”
    Get full text
    Get full text
    Get full text
    Book Section
  6. 6

    Whole brain radiation therapy verification using 2D gamma analysis method by Zainodin, Nik Nurul Afina Wan

    Published 2020
    “…The comparison between the PB and CC algorithms in the TPS calculation showed that the dose distribution using the PB algorithm gave a higher maximum and mean dose to the PTV compared to the CC algorithm by 0.15% and 0.1%. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Modified word representation vector based scalar weight for contextual text classification by Abbas Saliimi, Lokman

    Published 2024
    “…To validate this algorithm, the modified word vectors are compared with original LLM-generated word vectors to evaluate their reflection of the intended context. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Binary Vote Assignment on Cloud Quorum Algorithm for Fragmented MyGRANTS Database Replication by Noraziah, Ahmad, Ainul Azila, Che Fauzi, Herawan, Tutut, Zailani, Abdullah

    Published 2015
    “…Therefore, the storage, availability, and consistency are important issues to be addressed in order to allow distributed users efficiently and safely access data from many different sites. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Estimation Of Weibull Parameters Using Simulated Annealing As Applied In Financial Data by Hamza, Abubakar

    Published 2023
    “…The MIRR were computed based on the data extracted from the companies’ financial reports from 2010 to 2018. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    A novel binary vote assignment grid quorum algorithm for distributed database fragmentation by Ainul Azila, Che Fauzi, Noraziah, Ahmad, Noriyani, Mohd Zin

    Published 2011
    “…Therefore, the storage, availability, and consistency are important issues to be addressed in order to allow distributed users efficiently and safely access data from many different sites. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    The classification of wink-based eeg signals by means of transfer learning models by Jothi Letchumy, Mahendra Kumar

    Published 2021
    “…The implementation of pre-processing algorithms has been demonstrated to be able to mitigate the signal noises that arises from the winking signals without the need for the use signal filtering algorithms. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Network reconfiguration and control for loss reduction using genetic algorithm by Jawad, Mohamed Hassan Izzaldeen

    Published 2010
    “…All the data for 18-bus system test are taken from previous work, and all the data for 49-bus system test are taken from an existing Iraqi distribution network. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Data mining based damage identification using imperialist competitive algorithm and artificial neural network by Gordan, Meisam, Razak, Hashim Abdul, Ismail, Zubaidah, Ghaedi, Khaled

    Published 2018
    “…The efficiency coefficient and mean square error (MSE) are used to evaluate the performance of the ICA-ANN model. …”
    Get full text
    Get full text
    Article
  17. 17

    Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen by Shawkat S.A., Tuama B.A., Al-Barazanchi I.

    Published 2023
    “…In this paper, a comparative study is done between the two security algorithms on a cloud platform called eyeOS. From the comparative study it was found that the Rivest Shamir Adlemen (3kRSA) algorithm outperforms that triple data encryption standard (3DES) algorithm with respect to the complexity, and output bytes. …”
    Article
  18. 18

    Weighted subsethood segmented fuzzy time series for moving holiday electricity load demand forecasting by Mansor, R., Kasim, M.M., Othman, M.

    Published 2020
    “…The modified algorithm, Weighted Subsethood Segmented Fuzzy Time Series (WeSuSFTS) consists of three main phases; data pre-processing, forecasting based on WeSuSFTS model and model evaluation. …”
    Get full text
    Get full text
    Article
  19. 19

    Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani by Seyed Asadollah, Abdiesfandani

    Published 2016
    “…It then integrates both the semantic and syntactic similarity measures using a linear equation to capture the meaning in comparison between two sentences. It aims to distinguish the meaning of two sentences, when two sentences have same surface or share the similar bag-of-words (BOW), while their meaning is different. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Scheduled activity energy-aware distributed cluster- based routing algorithm for wireless sensor networks with non-uniform node distribution by Nokhanji, Nooshin

    Published 2014
    “…The main and definitive target of routing protocols in Wireless Sensor Networks (WSN) is passing data from the sensor nodes to the sink in most energy efficient manner besides considering the accuracy of data. …”
    Get full text
    Get full text
    Thesis