Search Results - (( automation evaluation method algorithm ) OR ( program implementation using algorithm ))

Refine Results
  1. 1

    Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja by Nurul Hani , Nortaja

    Published 2004
    “…The steps to calculate a shortest path using A • algorithm is shown by using appropriate examples and related figures. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Prediction on heart disease using multilayer neural network / Lily Syahira Sabrina Ab Rahman by Ab Rahman, Lily Syahira Sabrina

    Published 2017
    “…In order to automate the early detection an adequate algorithm is needed. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Space allocation for examination scheduling using Genetic Algorithm / Alya Kauthar Azman by Azman, Alya Kauthar

    Published 2025
    “…The research adopts a Genetic Algorithm-based approach, where examination scheduling details such as date, time, course code, program code, student group, student numbers, and available spaces are encoded as chromosomes. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Forward-Backward Time Stepping with Automated Edge-preserving Regularization Technique for Wood Defects Detection by Yong, Guang

    Published 2019
    “…The FBTS integrated with automated edge-preserving regularization algorithm is implemented in C++ programming language executed in parallel computing. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Automated calibration of baseline model for energy conservation using multi-objective Evolutionary Programming (EP) / Ahmad Amiruddin Mohammad Aris by Mohammad Aris, Ahmad Amiruddin

    Published 2019
    “…The co-simulation approach is proposed to obtain optimal solution of the thermal comfort-baseline energy configuration due to complexity in finding the trade-off between variables in reducing discrepancies between simulated energy consumption and measured data, furthermore leveraging automated computational calibration process. The proposed co-simulation process is developed by coupling building energy simulation (BES) software, Energy Plus with multi-objective evolutionary programming (MOEP) algorithm which is implemented in Matlab using coupling software, BCVTB. …”
    Get full text
    Get full text
    Thesis
  6. 6

    ProCAss: An intelligent assessment for computer programming corpus by Zen, Kartinah, Tarmizi, Seleviawati, A.I, Dayang Nurfatimah, Din, Inson, Chua, Sui Soon

    Published 2005
    “…Then, the ability of LSA algorithm in grading computer program corpus will be evaluated.The grading process will not limited on certain programming languages, but on any programming languages.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8

    Chili crop segregation system design and development strategies by Wan Daud, Wan Mohd Bukhari, Abdul Aziz, Mohd Fareezuan, Ahmad Izzuddin, Tarmizi, Norasikin, Mohd Adili, Abdul Rasid, Ahmad Fuad, Wakhi Anuar, Nur Farah Bazilah, M. N. Sukhaimie

    Published 2021
    “…The image data taken from chili samples can be trained by using Learning Algorithm in the MATLAB program. The performance of the trained network then can be evaluated by using the Confusion Matrix technique. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Evaluation of intracerebral haemorrhages surface area using artificial intelligence in computed tomography by Huddin, Azzam Basseri, Huddin, Aqilah Baseri, Tharek, Anas, Wan Zaki, Wan Mimi Diyana, Muda, Ahmad Sobri

    Published 2022
    “…This study aims to develop an automated detection algorithm with higher sensitivity in ICH evaluation in comparison to the conventional method. …”
    Get full text
    Get full text
    Article
  10. 10

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The evaluation of the security of the proposed scheme is based on SVO logic to verify the security of the informal method. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities by Draib, Najla'a Ateeq Mohammed

    Published 2022
    “…This technique also applies the removing algorithm, which uses escaping method to remove the detected vulnerabilities. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    AUTOMATED CERVICAL CELL NUCLEI SEGMENTATION BASED ON MULTILAYER UNSUPERVISED CLUSTERING ALGORITHM AND MORPHOLOGICAL APPROACH by Khalis Danial Nukman, Khiruddin, Wan Azani, Mustafa, Khairur Rijal, Jamaludin, Khairul Shakir, Ab Rahman, Hiam, Alquran, Syahrul Nizam, Junaini

    Published 2025
    “…The study utilized 917 images from the Herlev dataset to evaluate the method's performance. Image Quality Assessment (IQA) metrics, including accuracy, sensitivity, precision, specificity, and F-measure, demonstrate the method's efficacy. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Automated negative lightning return strokes characterization using brute-force search algorithm by Abdul Haris, Faranadia, Ab. Kadir, Mohd Zainal Abidin, Sudin, Sukhairi, Jasni, Jasronita, Johari, Dalina, Zaini, Nur Hazirah

    Published 2022
    “…A total of 170 lightning electric field waveforms were characterized automatically using the proposed algorithm. The manual and automated data were compared by evaluating their percentage difference, arithmetic mean (AM), and standard deviation (SD). …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Automated negative lightning return strokes characterization using brute-force search algorithm by Abdul Haris, Faranadia, Ab. Kadir, Mohd Zainal Abidin, Sudin, Sukhairi, Jasni, Jasronita, Johari, Dalina, Zaini, Nur Hazirah

    Published 2022
    “…A total of 170 lightning electric field waveforms were characterized automatically using the proposed algorithm. The manual and automated data were compared by evaluating their percentage difference, arithmetic mean (AM), and standard deviation (SD). …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Evaluating Machine Learning Algorithms for Fake Currency Detection by Keerthana, S.N, Chitra, K.

    Published 2024
    “…Additionally, we examine the performance of LightGBM, a gradientboosting algorithm, in comparison to these traditional methods. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    A Study of Automated Essay Scoring Frameworks on Evaluating Malaysian University English Test Essays Based on Syntactic and Semantic Features by Chun Then, Lim

    Published 2023
    “…An Automated Essay Scoring (AES) system can use a trained computational model to evaluate an essay as close to the grade that a human rater would assign. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Implementation of Autonomous Vehicle Navigation Algorithms Using Event-Driven Programming by Saman, Abu Bakar Sayuti, Sebastian , Patrick, Malek, Nadhira, Hasidin, Nurul Zahidah

    Published 2012
    “…The algorithm can be relatively easy translated to a suitable program with event-driven programming technique. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20