Search Results - (( re evaluation method algorithm ) OR ( based information based algorithm ))*
Search alternatives:
- evaluation method »
- based information »
- information based »
- method algorithm »
- re evaluation »
-
1
Segmentation of MRI brain images using statistical approaches
Published 2011“…The non-Local means (NL-means) algorithm is a state-of-the art neighbourhood-based noisereduction method which is time-consuming and its accuracy can be improved. …”
Get full text
Get full text
Thesis -
2
Optimizing Decentralized Exam Timetabling with a Discrete Whale Optimization Algorithm
Published 2025“…This problem remains an active area of research and, to the authors’ knowledge, has not been adequately addressed by the WOA algorithm. The method was evaluated using real-world data from the first semester of 2023/2024 for faculties at the Universiti of Sarawak, Malaysia. …”
Get full text
Get full text
Get full text
Article -
3
Optimizing decentralized exam timetabling with a discrete whale optimization algorithm
Published 2025“…This problem remains an active area of research and, to the authors' knowledge, has not been adequately addressed by the WOA algorithm. The method was evaluated using real-world data from the first semester of 2023/2024 for faculties at the Universiti of Sarawak, Malaysia. …”
Get full text
Get full text
Get full text
Article -
4
TDMA scheduling analysis of energy consumption for iot wireless sensor network
Published 2019“…The major objective for this project is to re-implement the proposed Energy Topology DRAND (E-T-DRAND) algorithm in IoT WSN using time slot allocation method and allocate nodes together with the node energy information and compare the obtained results with the corresponding results in the base paper. …”
Get full text
Get full text
Thesis -
5
Classification of Learner Retention using Machine Learning Approaches
Published 2021“…The performance of these algorithms was evaluated based on accuracy, precision, recall, and f-measure. …”
Get full text
Get full text
Conference or Workshop Item -
6
Topology-aware hypergraph based approach to optimize scheduling of parallel applications onto distributed parallel architectures
Published 2020“…For these reasons, to improve the time and accuracy of the coverage in population-based meta-heuristics and their utilization in HPAs, this thesis presents a novel optimization algorithm called the Raccoon Optimization Algorithm (ROA). …”
Get full text
Get full text
Thesis -
7
Robust Kernel Density Function Estimation
Published 2010“…The efficiency of the modified mutual information estimate is evaluated based on its accuracy. …”
Get full text
Get full text
Thesis -
8
Energy, Vibration And Sound Research Group (e-VIBS) School Of Science And Technology Universiti Malaysia Sabah : Bioacoustics Signal Modeling Using Time-Frequency Distribution
Published 2011“…Since the bioacoustics species identification system that proposed in this study is based on entropy approach, the computer algorithms is much easier (less complex) compared to the conventional methods, particularly based on spectrogram and sonogram. …”
Get full text
Get full text
Get full text
Research Report -
9
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…In recent years, data mining based anomaly detection (DMAD), particularly classification methods, have been incessantly enhanced in differentiating normal and attack behaviour. …”
Get full text
Get full text
Thesis -
10
Removal of heavy metals from water by functionalized carbon nanotubes with deep eutectic solvents: An artificial neural network approach / Seef Saadi Fiyadh
Published 2019“…The best result achieved for Pb2+ removal using ANFIS algorithm is with RE 7.078%. For As3+ removal using different adsorbents, two algorithms were applied for the modelling, the feed-forward back-propagation maximum RE achieved is 5.97% while, the NARX algorithm achieved better accuracy with maximum RE of 5.79%. …”
Get full text
Get full text
Get full text
Thesis -
11
A hybrid grey wolf assisted-sparrow search algorithm for frequency control of RE integrated system
Published 2023“…Moreover, the robustness of the proffered method is also evaluated under the random varying load, variation of HPS system parameter, and weather intermittency of RE resources in real-time conditions. …”
Get full text
Get full text
Article -
12
A review on the graphical user authentication algorithm : recognition-based and recall-based.
Published 2013“…User authentication has become an important consideration in information security as traditional password-based schemes are constantly subjected to attacks. …”
Get full text
Get full text
Article -
13
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
Get full text
Get full text
Thesis -
14
Hybrid metaheuristic method for clustering in wireless sensor networks / Bryan Raj Peter Jabaraj
Published 2023“…As such, this thesis proposes a hybrid metaheuristic method that consists of Sperm Swarm Optimization (SSO) algorithm and Genetic Algorithm (GA), which is termed HSSOGA. …”
Get full text
Get full text
Get full text
Thesis -
15
Agent-based extraction algorithm for computational problem solving
Published 2015“…The results show that the extraction algorithm has been able to extract 100 % of the information correctly. …”
Get full text
Get full text
Thesis -
16
MGR: An Information Theory Based Hierarchical Divisive Clustering Algorithm for Categorical Data
Published 2014“…This research proposes mean gain ratio (MGR), a new information theory based hierarchical divisive clustering algorithm for categorical data. …”
Get full text
Get full text
Get full text
Article -
17
Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan
Published 2014“…El-gamal encryption system is an asymmetric key encryption algorithm which is based on the Diffie-Hellman key exchange. …”
Get full text
Get full text
Thesis -
18
Adaptive intelligence job online scheduling within dynamic grid environment based on gridsim
Published 2008“…Additionally, the provided common information from Grid Information Service (GIS) and an arrival new job are calculated by Fuzzy C-Means (FCM) algorithm in order· to evaluate the current status of resources and groups of arrival jobs. …”
Get full text
Get full text
Article -
19
-
20
A new algorithm on Graphical User Authentication (GUA) based on multi-line grids
Published 2010“…Thereafter a comparative analysis of all Recall-Based algorithms based on attack patterns of graphical user authentication is tabulated. …”
Get full text
Get full text
Get full text
Article
