Search Results - solution ((((validation technique) OR (evaluation techniques))) OR (computing techniques))

Refine Results
  1. 1

    Optimization of medical image steganography using n-decomposition genetic algorithm by Al-Sarayefi, Bushra Abdullah Shtayt

    Published 2023
    “…The proposed technique showed resistance to statistical analysis evaluated using Reversible Statistical (RS) analysis and histogram. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Computational model of stepwise quantitative assessment of equations correctness / Nuru'l - 'Izzah Othman by Othman, Nuru'l - 'Izzah

    Published 2015
    “…Hence, the underlying computational techniques of the model can be regarded as correct. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Menyemak Jawapan Soalan Subjektif Menggunakan Pendekatan Pemprosesan Bahasa Tabii by Abas, Zulhazlin

    Published 2006
    “…Such technique is used prominently in the chatterbot applications. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A combined of fuzzy TOPSIS with z-number and alpha-cut for decision making problems by Nurnadiah, Zamri, Yahia Ibrahim, Awajan Khaleel

    Published 2019
    “…One of the easiest techniques from MCDM is Fuzzy Technique for Order Preference by Similarity to Ideal Solution (FTOPSIS). …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A lightweight framework for intensive mobile application processing in mobile cloud computing / Muhammad Shiraz by Muhammad , Shiraz

    Published 2013
    “…Therefore, lightweight techniques are imperative for the processing of computational intensive applications in MCC. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Industrial datasets with ICS testbed and attack detection using machine learning techniques by Mubarak, Sinil, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Balla, Asaad, Tahir, Mohammad, Elsheikh, Elfatih A A, Suliman, F M

    Published 2021
    “…The performance metrics such as accuracy, precision, recall, F1 score are evaluated and cross validated for different ML algorithms for anomaly detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    EEG-and MRI-based epilepsy source localization using multivariate empirical mode decomposition and inverse solution method by Khosropanah, Pegah

    Published 2018
    “…Therefore proposed algorithm has the advantages to localize EZ using ESL inexpensively and accurately which promotes usage of this valuable technique for epilepsy pre-surgical evaluation.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Power System State Estimation In Large-Scale Networks by NURSYARIZAL MOHD NOR, NURSYARIZAL

    Published 2010
    “…SE requires to use various techniques to ensure validity of the results and to detect and identify sources of errors. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Enhancement of collision avoidance technique in dynamic crowd simulations using visual cues and vision based algorithm by Iznora Aini Zolkifly

    Published 2022
    “…Therefore, agents could perceive the environment and try to find the optimal solutions with the aid of visual cues. The main objective of this study is to produce an enhanced technique that integrates the visual cue outcome in the collision avoidance pipeline during emergent situations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Decomposition–based multi-objective differential evolution for extractive multi-document automatic text summarization by Wahab, Muhammad Hafizul Hazmi, Abdul Hamid, Nor Asilah Wati, Subramaniam, Shamala, Latip, Rohaya, Othman, Mohamed

    Published 2024
    “…However, the current approach faces a significant hurdle due to the computational intensity of the process, particularly when employing complex optimization techniques like swarm intelligence optimization alongside a costly ATS repair operator. …”
    Get full text
    Get full text
    Article
  13. 13

    Multi-attribute decision-making for intrusion detection systems: a systematic review by Alamleh, Amneh, Albahri, O. S., Zaidan, A. A., Alamoodi, A. H., Albahri, A. S., Zaidan, B. B., Qahtan, Sarah, Ismail, Amelia Ritahani, Malik, R. Q., Baqer, M. J., Jasim, Ali Najm, Al-Samarraay, Mohammed S.

    Published 2022
    “…We must first understand the available solutions and gaps in this area of research to provide an insightful analysis of the combination of MADM techniques with IDS and support researchers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Join query enhancement processing (jqpro) with big rdf data on a distributed system using hashing-merge join technique by Nahla Mohammedelzein, Elawad Babiker

    Published 2021
    “…(ii) develop an enhancement model of Join Query Processing (JQPro) based on SPARQL and Hadoop MapReduce using hashing-merge join technique to process Big RDF Data. (iii) evaluate and compare the performance based on the execution time, throughput, and CPU utilization of the JQPro model with existing models. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Enhancing phishing detection with advanced ensemble learning techniques by Nur Syakirin Mohd Shahiran, Mohammed Ahmed

    Published 2025
    “…This study introduces an advanced phishing detection model that leverages ensemble learning techniques to improve accuracy, robustness, and adaptability. …”
    Get full text
    Get full text
    Article
  18. 18

    Named-entity recognition for numerical expression in Malay text-to-speech systems / Lit Wei Wern by Lit , Wei Wern

    Published 2019
    “…Natural Languages Processing (NLP) of the TTS system is the application of computational techniques to analysis and synthesis of natural language and speech. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20