Search Results - (( based constructive based algorithm ) OR ( data validation using algorithm ))
Search alternatives:
- based constructive »
- constructive based »
- validation using »
- data validation »
- using algorithm »
-
1
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…Therefore, it can be concluded that the strength and validity of KSAHC algorithm have been enhanced as compared to other algorithms and can serve as the alternative algorithm in designing security systems.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
3
Enhanced weight-optimized recurrent neural networks based on sine cosine algorithm for wave height prediction
Published 2021“…To validate the performance of the proposed models, metocean datasets have been used. …”
Get full text
Get full text
Article -
4
Dynamic determinant matrix-based block cipher algorithm
Published 2018“…This research also proposes a new method namely RotateSwapDeterminant function that uses rotation and swapping of the bit based on the 4x4 determinant computations and will act as the permutation layer in the DDBC algorithm. …”
Get full text
Get full text
Thesis -
5
Using algorithmic taxonomy to evaluate lecturer workload
Published 2006“…The Lecturer profile contains information of lecturer teaching load, research, publication and many more. We constructed an algorithmic taxonomy based on the lecturer profile data to measure lecturer teaching workload. …”
Get full text
Get full text
Get full text
Article -
6
Simulation-Based Power Estimation for High Throughput SHA-256 Design on Unfolding Transformation
Published 2022“…The algorithms are successfully designed using the Altera Quartus II platform. …”
Get full text
Get full text
Get full text
Proceeding -
7
A combinatory algorithm of univariate and multivariate gene selection
Published 2009“…Microarray technology has provided the means to monitor the expression levels of a large number of genes simultaneously. Constructing a classifier based on microarray data has emerged as an important problem for diseases such as cancer. …”
Get full text
Get full text
Get full text
Article -
8
A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata
Published 2019“…The protocol defines the procedures which engage two layers of deniability techniques; namely Secret Sharing and Valid Fake Messages. Secret Sharing technique is used to generate Fake Asymmetric Keys by using LaGrange Polynomial Interpolation formula and RSA algorithm. …”
Get full text
Get full text
Thesis -
9
Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal
Published 2006“…The Lecturer profile contains information lecturer teaching, research, publication and many more. We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload. …”
Get full text
Get full text
Conference or Workshop Item -
10
Effective gene selection techniques for classification of gene expression data
Published 2005“…Various k-means clustering algorithms and model-based clustering algorithms are proposed to group the genes. …”
Get full text
Get full text
Thesis -
11
Confidence intervals (CI) for concentration parameter in von Mises distribution and analysis of missing values for circular data / Siti Fatimah binti Hassan
Published 2015“…In this study, three imputation methods are considered namely expectation-maximization (EM) algorithm and data augmentation (DA) algorithm. All proposed methods are compared to the conventional methods. …”
Get full text
Get full text
Thesis -
12
Sentiment Analysis of Sexual Harassment in Malaysia on Twitter Using Machine Learning Algorithms
Published 2023“…The classifiers are validated and evaluated using accuracy, precision, recall, and f1-score along with 10-folds cross validation. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
13
Optimization of medical image steganography using n-decomposition genetic algorithm
Published 2023“…To overcome these limitations, this study proposes a technique known as an n-decomposition genetic algorithm. This algorithm uses a variable-length search to identify the best location to embed the secret message by incorporating constraints to avoid local minimum traps. …”
Get full text
Get full text
Get full text
Thesis -
14
Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal
Published 2006“…Lecturer workload at universities includes three major categories: teaching, research and services.Teaching workload is influence by various factors such as level taught courses, number of student, credit and contact hour and off campus or on campus course design.The UPM has a KM Portal that contains sets of metadata on lecturer profile and knowledge assets.The Lecturer profile contains information lecturer teaching, research, publication and many more.We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload.This method measures the lecturer teaching workload.The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset.Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. The performance of the recommended approach makes it possible to thwart an attack using brute force considerably more fast than is possible with the encryption technologies that are currently in use. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Agreement options for negotiation on material location decision of housing development
Published 2020“…A support model enables negotiation process in group decision. Decision algorithms are based on the cooperative game theory to develop the agreement options and coalition formation. …”
Get full text
Get full text
Article -
17
Complex word identification model for lexical simplification in the Malay language for non-native speakers
Published 2023“…The model is evaluated based on a state-of-the-art Malay corpus. This corpus is divided into training and testing data using k-fold cross-validation, where k=10. …”
Get full text
Get full text
Get full text
Thesis -
18
Theory-guided machine learning for predicting and minimising surface settlement caused by the excavation of twin tunnels / Chia Yu Huat
Published 2024“…This is due to the data generated from the numerical model possess the pattern for the ML algorithm ease of prediction. …”
Get full text
Get full text
Get full text
Thesis -
19
A robust firefly algorithm with backpropagation neural networks for solving hydrogeneration prediction
Published 2018“…The objective of this study, first, a firefly algorithm (FA) based on the k-fold cross-validation of BPNN has been suggested to predict data for keeping rapid learning and prevents the exponential increase in operating parts. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Optimal Weighted Learning of PCA and PLS for Multicollinearity Discriminators and Imbalanced Groups in Big Data (S/O: 13224)
“…The designed algorithm was structured in k-fold cross-validation in attempt to minimise the biasness of the classification performance, measured using error rate. …”
Get full text
Get full text
Monograph
