Search Results - (( processes specification method algorithm ) OR ( probable evaluation method algorithm ))
Search alternatives:
- processes specification »
- specification method »
- probable evaluation »
- method algorithm »
-
1
Efficient management of Top-k queries over Uncertain Data Streams with dynamic Sliding Window Model
Published 2024“…After establishing this model's rules and probability theory, a method was designed to support the Top-k processing algorithm over the SWM until the Top-k potential candidates expired. …”
Get full text
Get full text
Get full text
Thesis -
2
Improving amphetamine-type stimulants drug classification using chaotic-based time-varying binary whale optimization algorithm
Published 2022“…Specific high-dimensional molecular descriptors of ATS and non-ATS drugs were employed to evaluate the efficiency of the proposed algorithm. …”
Get full text
Get full text
Get full text
Article -
3
A realtime Runner Help Me mobile application using geolocation technique / Nurul Amierah Abd Rahman
Published 2019“…Afterward, the runner will pick random number or based on the job without having specific algorithm to charge the customer. It will be inappropriate since the runner monopolize the price without customer concern. …”
Get full text
Get full text
Thesis -
4
An enhanced sequential exception technique for semantic-based text anomaly detection
Published 2019“…ESET performs text anomaly detection by employing optimized Cosine Similarity, hybridizing LSA with modified SET, and integrating it with Word Sense Disambiguation algorithms specifically Lesk and Selectional Preference. …”
Get full text
Get full text
Get full text
Thesis -
5
Human tracking in video surveillance using particle filter
Published 2016“…The technique performed excellently well when evaluated on the publicly available CAVIAR dataset and outperformed the Kalman filter algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
6
Structural crack detection using deep convolutional neural network / Raza Ali
Published 2022“…Thanks to the advancement in hardware, data collection procedures, and efficient algorithms. These innovations have changed the way how specific problems are solved as compared to conventional methods. …”
Get full text
Get full text
Get full text
Thesis -
7
Evaluation of machine learning classifiers in faulty die prediction to maximize cost scrapping avoidance and assembly test capacity savings in semiconductor integrated circuit (IC)...
Published 2019“…The multi die packaging requires more processing steps and tools in assembly process as well. …”
Get full text
Get full text
Get full text
Article -
8
Tree-based contrast subspace mining method
Published 2020“…Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
Get full text
Get full text
Get full text
Thesis -
9
Analysis of tumour control probability, normal tissue complication probability and isotoxic effects for prostate cancer
Published 2016“…Variation in evaluation method will not give similar findings even same data is used. …”
Get full text
Get full text
Monograph -
10
MM-PNEMO: a mathematical model to assess handoff delay and packet loss
Published 2019“…Thus, it is uphill to use algorithms having giant processing power or memory footprint. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Modified Contrast Limited Adaptive Histogram Equalization for high dynamic range images
Published 2012“…The generated probability map of the proposed tone mapped algorithm was then compared with the generated probability map of Ward tone mapping algorithm. …”
Get full text
Get full text
Thesis -
12
The effect of dose calculation algorithms on the normal tissue complication probability values of thoracic cancer
Published 2015“…Four treatment plans are created and DVHs are evaluated based on criteria of acceptance level. NTCP values for thorax plan one and two are evaluated by using different algorithm. …”
Get full text
Get full text
Monograph -
13
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…Subsequently, NB+RF, a hybrid classification algorithm is used to distinguish similar and dissimilar content behaviours of a packet. …”
Get full text
Get full text
Thesis -
14
VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern
Published 2012“…CE is a new algorithm that was recently developed using probability. …”
Get full text
Get full text
Thesis -
15
-
16
Overview of metaheuristic: classification of population and trajectory
Published 2010“…An algorithm that applies a metaheuristic method is used when there are no specific methods to find a solution. …”
Get full text
Get full text
Monograph -
17
Spam image filtering algorithm / Muhammad Hazim Shahimi
Published 2015“…This project applied Optical Character Recognition (OCR) and Bayesian probability to filter the spam images. The evaluation task is done by using formula of Precision, Recall, Error Rate, and Accuracy. …”
Get full text
Get full text
Thesis -
18
Microcrack Detection And Noise Reduction In Integrated Circuit Packages
Published 2018“…Three algorithms are tested and evaluated in terms of microcrack detection and noise reduction which are probability based thresholding, histogram equalization, and modified Perona-Malik’s anisotropic diffusion methods. …”
Get full text
Get full text
Monograph -
19
-
20
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Thus, proposing the method of reestimating the dropping functions in the RED algorithm. …”
Get full text
Get full text
Thesis
