Search Results - (( software evaluation method algorithm ) OR ( rate evaluation method algorithm ))

Refine Results
  1. 1

    Experimental evaluation of data fusion algorithm for residual generation in detecting UAV servo actuator fault by Sahwee Z., Rahman N.A., Sahari K.S.M.

    Published 2023
    “…Algorithms; Data fusion; Hardware; Military vehicles; Redundancy; Software reliability; Unmanned aerial vehicles (UAV); Analytical redundancy; Data fusion algorithm; Experimental evaluation; Fault detection algorithm; Hostile environments; Model reference methods; On-board fault detection; Software and hardwares; Fault detection…”
    Article
  2. 2

    Whole brain radiation therapy verification using 2D gamma analysis method by Zainodin, Nik Nurul Afina Wan

    Published 2020
    “…Furthermore, the accuracy of both algorithms was evaluated using EBT3 film by comparing the gamma index passing rate in a Verisoft software. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A selective approach for energy-aware video content adaptation decision-taking engine in android based smartphone by Abd Rahim, Mohd Hilmi Izwan

    Published 2019
    “…Subjective evaluation by selected respondents are also has been made using Absolute Category Rating method as recommended by ITU to evaluate EnVADE algorithm in term of QoE. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Simulation of fast recursive least square algorithm for echo cancellation system by Kamaruddin, Rosita

    Published 2003
    “…The performance of FRLS algorithm for both filters is described and evaluated by using MATLAB software .. …”
    Get full text
    Get full text
    Student Project
  5. 5

    Backpropagation neural network based on local search strategy and enhanced multi-objective evolutionary algorithm for breast cancer diagnosis by Ashraf Osman, Ibrahim, Siti Mariyam, Shamsuddin, Abdulrazak, Yahya Saleh, Ahmed, Ali, Mohd Arfian, Ismail, Shahreen, Kasim

    Published 2019
    “…The network size and accuracy results of the proposed method are better than the previous methods. Therefore, the method is then capable of finding a proper number of hidden neurons and error rates of the BP algorithm.…”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan by Diaa , Mohammed Hassan Uliyan

    Published 2016
    “…The average detection rate of our algorithm maintained 96 % true positive rate and 7 % false positive rate which outperform several current detection methods. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Anomaly-based intrusion detection through K-Means clustering and Naives Bayes classification by Yassin, Warusia, Udzir, Nur Izura, Muda, Zaiton, Sulaiman, Md Nasir

    Published 2013
    “…Intrusion detection systems (IDSs) effectively balance extra security appliance by identifying intrusive activities on a computer system, and their enhancement is emerging at an unexpected rate.Anomaly-based intrusion detection methods, which employ machine learning algorithms, are able to identify unforeseen attacks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Model optimization using artificial intelligence algorithms for biological food waste degradation by N., Zainol, Abdul Sahli, Fakharudin, Nor Ilyya Syahira, Zulaidi

    Published 2020
    “…The main objective of this research is to evaluate the optimum condition of aerobic bacteria growth for food waste degradation by comparing the implementation of response surface method (RSM) and genetic algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book Chapter
  12. 12

    Development of a new robust hybrid automata algorithm based on surface electromyography (SEMG) signal for instrumented wheelchair control by Mohd Hanafi, Muhammad Sidik

    Published 2020
    “…Based on algorithm evaluation, it shows that one control method couldn’t fit to all persons as per proven in method selection experiment. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Ischemic Stroke Detection System With Computer Aided Diagnostic Capability by Lina, Tay

    Published 2017
    “…The performance evaluations of the detection methods are measured by accuracy percentage and processing time. …”
    Get full text
    Get full text
    Monograph
  14. 14

    An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons by Ghanem, Waheed Ali H. M., Aman, Jantan, Ahmed Ghaleb, Sanaa Abduljabbar, Naseer, Abdullah B.

    Published 2020
    “…This study proposes a new binary classification model for intrusion detection, based on hybridization of Artificial Bee Colony algorithm (ABC) and Dragonfly algorithm (DA) for training an artificial neural network (ANN) in order to increase the classification accuracy rate for malicious and non-malicious traffic in networks. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Modular motor driver with torque control for gripping mechanism by How D.N.T., Baharuddin M.Z., Mohideen S.S.K., Sahari K.S.M., Anuar A.

    Published 2023
    “…These graphical outputs of the controller was evaluated based on the response time, degree of overshooting, and steady-state error to determine the most optimal method of control to be implemented in torque control scheme. …”
    Conference paper
  16. 16

    Evaluations of oil palm fresh fruit bunches maturity degree using multiband spectrometer by Tuerxun, Adilijiang

    Published 2017
    “…Furthermore, the Lazy-IBK algorithm have been validated to produce the best classifier model, with the machine learning algorithm performance of 65.26%, recall of 65.3%, and 65.4% F-measured as compared to other evaluated machine learning classifier algorithms proposed within the WEKA data mining algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation by Chen, Soong Der

    Published 2000
    “…When such a block was detected, some of the standard processing steps may be skipped and some computation may be saved. The proposed new algorithm was evaluated and the results indicate that it was practical in low bit rate environments targeted by H.263 as no negative speed gain was observed for the full range of step size during the evaluation. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A regression test case selection and prioritization for object-oriented programs using dependency graph and genetic algorithm by Musa, Samaila, Md Sultan, Abu Bakar, Abd Ghani, Abdul Azim, Baharom, Salmi

    Published 2014
    “…The goodness of this ordering is measured using Average Percentage of rate of Faults Detection (APFD) metric to evaluate the effectiveness and efficiency of the approach. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Quality assessment of stereoscopic image by 3D structural similarity by Voo, Kenny H B, Bong, David B.L.

    Published 2018
    “…Objective image quality assessment is proposed with the intention to substitute human-rated subjective evaluation by using computational method. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Paper Survey And Example Of Collaborative Filtering Implementation In Recommender System by Hanafi, Suryana, Nanna, Hasan Basari, Abd Samad

    Published 2017
    “…User rating strategy and user preferences are associated with user behavior to find suitable recommended items. …”
    Get full text
    Get full text
    Get full text
    Article