Search Results - (( _ (constructive OR constructing) method algorithm ) OR ( data validation using algorithm ))
Search alternatives:
- method algorithm »
- validation using »
- data validation »
- using algorithm »
-
1
Strategies for effective value management practice in construction industry
Published 2017“…The quantitative data were subjected to descriptive statistical method analysis using statistical software, while the qualitative data were subjected to pattern matching methods, and cross-case and constant comparative data analysis. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
3
Landslide susceptibility mapping at VAZ watershed (Iran) using an artificial neural network model: a comparison between multilayer perceptron (MLP) and radial basic function (RBF)...
Published 2013“…Finally the landslide susceptibility maps were validated using the validation data (i.e., 30 % landslide location data that was not used during the model construction) using area under the curve (AUC) method. …”
Get full text
Get full text
Article -
4
Using algorithmic taxonomy to evaluate lecturer workload
Published 2006“…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Get full text
Article -
5
A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata
Published 2019“…The main components of cryptography are the algorithm and the key management. However, an adversary could use coercion method where both components can no longer be reliable. …”
Get full text
Get full text
Thesis -
6
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID
Published 2013“…Compared to existing calibration procedure our method requires only few signal samples from RFID tags to be collected and rest of the database is recovered using path-loss prediction algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
8
Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal
Published 2006“…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Conference or Workshop Item -
9
Confidence intervals (CI) for concentration parameter in von Mises distribution and analysis of missing values for circular data / Siti Fatimah binti Hassan
Published 2015“…In this study, three imputation methods are considered namely expectation-maximization (EM) algorithm and data augmentation (DA) algorithm. …”
Get full text
Get full text
Thesis -
10
Dynamic determinant matrix-based block cipher algorithm
Published 2018“…The performance analysis in terms of processing speed of the encryption and decryption process of the DDBC algorithm shows minimal differences in both AES and DDBC algorithm despite of the difference method of transformation used in both algorithms. …”
Get full text
Get full text
Thesis -
11
Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal
Published 2006“…Lecturer workload at universities includes three major categories: teaching, research and services.Teaching workload is influence by various factors such as level taught courses, number of student, credit and contact hour and off campus or on campus course design.The UPM has a KM Portal that contains sets of metadata on lecturer profile and knowledge assets.The Lecturer profile contains information lecturer teaching, research, publication and many more.We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload.This method measures the lecturer teaching workload.The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset.Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
PSO and Linear LS for parameter estimation of NARMAX/NARMA/NARX models for non-linear data / Siti Muniroh Abdullah
Published 2017“…Typically, parameter estimation is performed using various types of Least Squares (LS) algorithms due to its stable and efficient numerical computation. …”
Get full text
Get full text
Thesis -
13
Parametric system identification and active vibration control of vibrational structures using genetic algorithm
Published 2007“…The sets of data obtained were utilised to develop ARX model using Least Squares (LS), Recursive Least Squares (RLS) and Genetic Algorithm (GA) methods. …”
Get full text
Get full text
Thesis -
14
A combinatory algorithm of univariate and multivariate gene selection
Published 2009“…Repeatability of selected genes is evaluated by external 10-fold cross validation whereas SVM and PLR classifiers are used to classify two well known datasets for cancers. …”
Get full text
Get full text
Get full text
Article -
15
Optimal Weighted Learning of PCA and PLS for Multicollinearity Discriminators and Imbalanced Groups in Big Data (S/O: 13224)
“…The designed algorithm was structured in k-fold cross-validation in attempt to minimise the biasness of the classification performance, measured using error rate. …”
Get full text
Get full text
Monograph -
16
Fused multivariate empirical mode decomposition (MEMD) and inverse solution method for EEG source localization
Published 2018“…We also developed an unsupervised algorithm utilizing a wavelet method to remove eye blink artifacts. …”
Get full text
Get full text
Article -
17
Fused multivariate empirical mode decomposition (MEMD) and inverse solution method for EEG source localization
Published 2018“…We also developed an unsupervised algorithm utilizing a wavelet method to remove eye blink artifacts. …”
Get full text
Get full text
Get full text
Article -
18
Deep learning for EEG data analysis
Published 2018“…The convolutional neural network (CNN) model constructed in this project has achieved a validation accuracy of 75±1% using the same EEG dataset. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
A robust firefly algorithm with backpropagation neural networks for solving hydrogeneration prediction
Published 2018“…The objective of this study, first, a firefly algorithm (FA) based on the k-fold cross-validation of BPNN has been suggested to predict data for keeping rapid learning and prevents the exponential increase in operating parts. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Variable Neighborhood Descent and Whale Optimization Algorithm for Examination Timetabling Problems at Universiti Malaysia Sarawak
Published 2025“…A constructive algorithm was developed to generate an initial feasible solution, which was subsequently refined using two primary approaches to evaluate their efficiency: Iterative Threshold Pipe Variable Neighborhood Descent (IT-PVND), and a modified Whale Optimization Algorithm (WOA). …”
Get full text
Get full text
Get full text
Get full text
Thesis
