Search Results - (( re evaluation method algorithm ) OR ( based information ((a algorithm) OR (_ algorithm)) ))

Refine Results
  1. 1

    Segmentation of MRI brain images using statistical approaches by Balafar, Mohammad Ali

    Published 2011
    “…The non-Local means (NL-means) algorithm is a state-of-the art neighbourhood-based noisereduction method which is time-consuming and its accuracy can be improved. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Optimizing Decentralized Exam Timetabling with a Discrete Whale Optimization Algorithm by Emily Siew, Sing Kiang, Sze, San Nah, Goh, Say Leng

    Published 2025
    “…This problem remains an active area of research and, to the authors’ knowledge, has not been adequately addressed by the WOA algorithm. The method was evaluated using real-world data from the first semester of 2023/2024 for faculties at the Universiti of Sarawak, Malaysia. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Optimizing decentralized exam timetabling with a discrete whale optimization algorithm by Emily Sing Kiang Siew, San nah sze, Say leng goh

    Published 2025
    “…This problem remains an active area of research and, to the authors' knowledge, has not been adequately addressed by the WOA algorithm. The method was evaluated using real-world data from the first semester of 2023/2024 for faculties at the Universiti of Sarawak, Malaysia. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Classification of Learner Retention using Machine Learning Approaches by Nur Amalina Diyana Suhaimi , Norshaliza Kamaruddin, Thirumeni T Subramaniam, Nilam Nur Amir Sjarif, Maslin Masrom, Nurazean Maarop

    Published 2021
    “…The performance of these algorithms was evaluated based on accuracy, precision, recall, and f-measure. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Topology-aware hypergraph based approach to optimize scheduling of parallel applications onto distributed parallel architectures by Koohi, Sina Zangbari

    Published 2020
    “…For these reasons, to improve the time and accuracy of the coverage in population-based meta-heuristics and their utilization in HPAs, this thesis presents a novel optimization algorithm called the Raccoon Optimization Algorithm (ROA). …”
    Get full text
    Get full text
    Thesis
  6. 6

    TDMA scheduling analysis of energy consumption for iot wireless sensor network by Islam, Md Ashikul

    Published 2019
    “…The major objective for this project is to re-implement the proposed Energy Topology DRAND (E-T-DRAND) algorithm in IoT WSN using time slot allocation method and allocate nodes together with the node energy information and compare the obtained results with the corresponding results in the base paper. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Robust Kernel Density Function Estimation by Dadkhah, Kourosh

    Published 2010
    “…The efficiency of the modified mutual information estimate is evaluated based on its accuracy. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Energy, Vibration And Sound Research Group (e-VIBS) School Of Science And Technology Universiti Malaysia Sabah : Bioacoustics Signal Modeling Using Time-Frequency Distribution by Jedol Dayou, Ng, Chee Han, Ho, Chong Mun, Abdul Hamid Ahmad, Mohd Noh Dalimin, Sithi V. Muniandy

    Published 2011
    “…Since the bioacoustics species identification system that proposed in this study is based on entropy approach, the computer algorithms is much easier (less complex) compared to the conventional methods, particularly based on spectrogram and sonogram. …”
    Get full text
    Get full text
    Get full text
    Research Report
  9. 9

    Channel quality information (CQI) reporting algorithms in LTE-A by Ahamad Sukor, Masturah, Mohd. Ramli, Huda Adibah

    Published 2016
    “…The simulation results show that the average CQI reporting algorithm produced more compromising results than the automated CQI reporting algorithm and the average RB-based CQI reporting algorithm…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Adaptive intelligence job online scheduling within dynamic grid environment based on gridsim by Lorpunmanee, Siriluck, Md. Sap, Mohd. Noor, Abdullah, Abdul Hanan

    Published 2008
    “…Moreover, both dynamic and static information are handled by the solution. In static case, the resource information such as a number of CPUs of a machine, CPU speed, a number machine in the grid system is significantly known in advance while dynamic information like the arrival jobs that are submitted to the system any time during simulation. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan by Mohd Amdan, Muhammad Awwab

    Published 2014
    “…Guaranteeing anonymous usage of location-based services however requires that the precise location information transmitted by a user cannot be easily used to identify the subject. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Adaptive firefly algorithm for hierarchical text clustering by Mohammed, Athraa Jasim

    Published 2016
    “…In order to refine the obtained clusters, a second algorithm, termed as Weight-based Firefly Algorithm with Relocate (WFAR), is proposed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network by Ridwan M.A., Radzi N.A.M., Azmi K.H.M., Abdullah F., Ahmad W.S.H.M.W.

    Published 2024
    “…The ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
    Article
  18. 18

    Design of information hiding algorithm for multi-link network transmission channel by Fu, Songyin, Wang, Rangding

    Published 2019
    “…This shows that the algorithm has a high accuracy in extracting secret information. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Efficient Entropy-Based Decoding Algorithms For Higher-Order Hidden Markov Model by Chan, Chin Tiong

    Published 2019
    “…This algorithm is a memory-efficient algorithm due to its required memory space that is time independent. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A new algorithm on Graphical User Authentication (GUA) based on multi-line grids by Lashkari, Arash Habibi, Gani, Abdullah, Sabet, Leila Ghasemi, Farmand, Samaneh

    Published 2010
    “…Thereafter a comparative analysis of all Recall-Based algorithms based on attack patterns of graphical user authentication is tabulated. …”
    Get full text
    Get full text
    Get full text
    Article