Search Results - (( re evaluation between algorithm ) OR ( based information based algorithm ))*
Search alternatives:
- evaluation between »
- between algorithm »
- based information »
- information based »
- re evaluation »
-
1
Segmentation of MRI brain images using statistical approaches
Published 2011“…In addition, two algorithms for the post-processing of clustering results using user-interaction and the re-evaluation of boundary data in each cluster are presented. …”
Get full text
Get full text
Thesis -
2
TDMA scheduling analysis of energy consumption for iot wireless sensor network
Published 2019“…Finally, represent the difference between experimental results and the old results of E-T-DRAND will determine if the algorithm has been efficiently re-implemented.…”
Get full text
Get full text
Thesis -
3
State-Aware re-configuration model for multi-radio wireless Mesh Networks
Published 2017“…The proposed algorithm re-assigns channels to radios and re-configures flows’ routes with aim of achieving a tradeoff between maximizing the network throughput and minimizing the re-configuration overhead. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
4
Weather prediction system using ANN algorithm / Nur Afiqah Ahmad Sukri
Published 2024“…This research gives a thorough investigation into ANN-based weather prediction. The objective of the project is to develop a weather prediction system using artificial neural network (ANN) algorithms and to evaluate its performance and accuracy. …”
Get full text
Get full text
Thesis -
5
Topology-aware hypergraph based approach to optimize scheduling of parallel applications onto distributed parallel architectures
Published 2020“…For these reasons, to improve the time and accuracy of the coverage in population-based meta-heuristics and their utilization in HPAs, this thesis presents a novel optimization algorithm called the Raccoon Optimization Algorithm (ROA). …”
Get full text
Get full text
Thesis -
6
Energy, Vibration And Sound Research Group (e-VIBS) School Of Science And Technology Universiti Malaysia Sabah : Bioacoustics Signal Modeling Using Time-Frequency Distribution
Published 2011“…Since the bioacoustics species identification system that proposed in this study is based on entropy approach, the computer algorithms is much easier (less complex) compared to the conventional methods, particularly based on spectrogram and sonogram. …”
Get full text
Get full text
Get full text
Research Report -
7
Enhancing teaching and learning through data-driven optimization of servicing code demand and lecturer allocation using WEKA analysis
Published 2025“…Complementary K-Means clustering grouped the data into two major clusters, indicating that a clear differentiation between economic-based and entrepreneurship-based courses in terms of student enrolment volume and approval distribution. …”
Get full text
Get full text
Get full text
Article -
8
Removal of heavy metals from water by functionalized carbon nanotubes with deep eutectic solvents: An artificial neural network approach / Seef Saadi Fiyadh
Published 2019“…The best result achieved for Pb2+ removal using ANFIS algorithm is with RE 7.078%. For As3+ removal using different adsorbents, two algorithms were applied for the modelling, the feed-forward back-propagation maximum RE achieved is 5.97% while, the NARX algorithm achieved better accuracy with maximum RE of 5.79%. …”
Get full text
Get full text
Get full text
Thesis -
9
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…Subsequently, NB+RF, a hybrid classification algorithm is used to distinguish similar and dissimilar content behaviours of a packet. …”
Get full text
Get full text
Thesis -
10
A review on the graphical user authentication algorithm : recognition-based and recall-based.
Published 2013“…User authentication has become an important consideration in information security as traditional password-based schemes are constantly subjected to attacks. …”
Get full text
Get full text
Article -
11
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
Get full text
Get full text
Thesis -
12
Agent-based extraction algorithm for computational problem solving
Published 2015“…The results show that the extraction algorithm has been able to extract 100 % of the information correctly. …”
Get full text
Get full text
Thesis -
13
MGR: An Information Theory Based Hierarchical Divisive Clustering Algorithm for Categorical Data
Published 2014“…This research proposes mean gain ratio (MGR), a new information theory based hierarchical divisive clustering algorithm for categorical data. …”
Get full text
Get full text
Get full text
Article -
14
Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan
Published 2014“…El-gamal encryption system is an asymmetric key encryption algorithm which is based on the Diffie-Hellman key exchange. …”
Get full text
Get full text
Thesis -
15
Adaptive intelligence job online scheduling within dynamic grid environment based on gridsim
Published 2008“…Additionally, the provided common information from Grid Information Service (GIS) and an arrival new job are calculated by Fuzzy C-Means (FCM) algorithm in order· to evaluate the current status of resources and groups of arrival jobs. …”
Get full text
Get full text
Article -
16
-
17
A new algorithm on Graphical User Authentication (GUA) based on multi-line grids
Published 2010“…Thereafter a comparative analysis of all Recall-Based algorithms based on attack patterns of graphical user authentication is tabulated. …”
Get full text
Get full text
Get full text
Article -
18
An adaptive density-based method for clustering evolving data streams / Amineh Amini
Published 2014“…This study proposes a density-based algorithm for clustering evolving data streams. …”
Get full text
Get full text
Get full text
Thesis -
19
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
Get full text
Get full text
Get full text
Article -
20
Algorithms for extracting adjacency matrix based on Formal Concept Analysis (FCA)
Published 2017“…The desire to achieve a holistic representation of Information Retrieval (IR) with the aim for a human-oriented form of representation has spurred the growth of concept-based IR search techniques such as the Semantic Web technology. …”
Get full text
Get full text
Conference or Workshop Item
