Search Results - solution ((((evaluation techniques) OR (validation technique))) OR (computing techniques))
Search alternatives:
- evaluation techniques »
- validation technique »
- computing techniques »
-
1
Optimization of medical image steganography using n-decomposition genetic algorithm
Published 2023“…The proposed technique showed resistance to statistical analysis evaluated using Reversible Statistical (RS) analysis and histogram. …”
Get full text
Get full text
Get full text
Thesis -
2
Computational model of stepwise quantitative assessment of equations correctness / Nuru'l - 'Izzah Othman
Published 2015“…Hence, the underlying computational techniques of the model can be regarded as correct. …”
Get full text
Get full text
Thesis -
3
Menyemak Jawapan Soalan Subjektif Menggunakan Pendekatan Pemprosesan Bahasa Tabii
Published 2006“…Such technique is used prominently in the chatterbot applications. …”
Get full text
Get full text
Get full text
Thesis -
4
A combined of fuzzy TOPSIS with z-number and alpha-cut for decision making problems
Published 2019“…One of the easiest techniques from MCDM is Fuzzy Technique for Order Preference by Similarity to Ideal Solution (FTOPSIS). …”
Get full text
Get full text
Conference or Workshop Item -
5
A lightweight framework for intensive mobile application processing in mobile cloud computing / Muhammad Shiraz
Published 2013“…Therefore, lightweight techniques are imperative for the processing of computational intensive applications in MCC. …”
Get full text
Get full text
Thesis -
6
Industrial datasets with ICS testbed and attack detection using machine learning techniques
Published 2021“…The performance metrics such as accuracy, precision, recall, F1 score are evaluated and cross validated for different ML algorithms for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
-
8
EEG-and MRI-based epilepsy source localization using multivariate empirical mode decomposition and inverse solution method
Published 2018“…Therefore proposed algorithm has the advantages to localize EZ using ESL inexpensively and accurately which promotes usage of this valuable technique for epilepsy pre-surgical evaluation.…”
Get full text
Get full text
Thesis -
9
Power System State Estimation In Large-Scale Networks
Published 2010“…SE requires to use various techniques to ensure validity of the results and to detect and identify sources of errors. …”
Get full text
Get full text
Thesis -
10
Enhancement of collision avoidance technique in dynamic crowd simulations using visual cues and vision based algorithm
Published 2022“…Therefore, agents could perceive the environment and try to find the optimal solutions with the aid of visual cues. The main objective of this study is to produce an enhanced technique that integrates the visual cue outcome in the collision avoidance pipeline during emergent situations. …”
Get full text
Get full text
Get full text
Thesis -
11
-
12
Decomposition–based multi-objective differential evolution for extractive multi-document automatic text summarization
Published 2024“…However, the current approach faces a significant hurdle due to the computational intensity of the process, particularly when employing complex optimization techniques like swarm intelligence optimization alongside a costly ATS repair operator. …”
Get full text
Get full text
Article -
13
Multi-attribute decision-making for intrusion detection systems: a systematic review
Published 2022“…We must first understand the available solutions and gaps in this area of research to provide an insightful analysis of the combination of MADM techniques with IDS and support researchers. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
-
15
Join query enhancement processing (jqpro) with big rdf data on a distributed system using hashing-merge join technique
Published 2021“…(ii) develop an enhancement model of Join Query Processing (JQPro) based on SPARQL and Hadoop MapReduce using hashing-merge join technique to process Big RDF Data. (iii) evaluate and compare the performance based on the execution time, throughput, and CPU utilization of the JQPro model with existing models. …”
Get full text
Get full text
Thesis -
16
-
17
Enhancing phishing detection with advanced ensemble learning techniques
Published 2025“…This study introduces an advanced phishing detection model that leverages ensemble learning techniques to improve accuracy, robustness, and adaptability. …”
Get full text
Get full text
Article -
18
Named-entity recognition for numerical expression in Malay text-to-speech systems / Lit Wei Wern
Published 2019“…Natural Languages Processing (NLP) of the TTS system is the application of computational techniques to analysis and synthesis of natural language and speech. …”
Get full text
Get full text
Get full text
Thesis -
19
Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio...
Published 2023“…Mobile edge computing (MEC) is a well-known technique to support delay-sensitive applications at the edge of mobile networks. …”
Get full text
Get full text
Thesis -
20
Variable order step size method for solving orbital problems with periodic solutions
Published 2024journal::journal article
