Search Results - (( based constructive method algorithm ) OR ( _ validation using algorithm ))
Search alternatives:
- based constructive »
- method algorithm »
- validation using »
- using algorithm »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
2
Using algorithmic taxonomy to evaluate lecturer workload
Published 2006“…The Lecturer profile contains information of lecturer teaching load, research, publication and many more. We constructed an algorithmic taxonomy based on the lecturer profile data to measure lecturer teaching workload. …”
Get full text
Get full text
Get full text
Article -
3
Dynamic determinant matrix-based block cipher algorithm
Published 2018“…This research also proposes a new method namely RotateSwapDeterminant function that uses rotation and swapping of the bit based on the 4x4 determinant computations and will act as the permutation layer in the DDBC algorithm. …”
Get full text
Get full text
Thesis -
4
Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal
Published 2006“…The Lecturer profile contains information lecturer teaching, research, publication and many more. We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload. …”
Get full text
Get full text
Conference or Workshop Item -
5
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
A combinatory algorithm of univariate and multivariate gene selection
Published 2009“…Gene selection is usually based on univariate or multivariate methods. Univariate methods for gene selection cannot address interactions among multiple genes, a situation which demands the multivariate methods [1], [2]. …”
Get full text
Get full text
Get full text
Article -
7
A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata
Published 2019“…The protocol defines the procedures which engage two layers of deniability techniques; namely Secret Sharing and Valid Fake Messages. Secret Sharing technique is used to generate Fake Asymmetric Keys by using LaGrange Polynomial Interpolation formula and RSA algorithm. …”
Get full text
Get full text
Thesis -
8
Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal
Published 2006“…Lecturer workload at universities includes three major categories: teaching, research and services.Teaching workload is influence by various factors such as level taught courses, number of student, credit and contact hour and off campus or on campus course design.The UPM has a KM Portal that contains sets of metadata on lecturer profile and knowledge assets.The Lecturer profile contains information lecturer teaching, research, publication and many more.We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload.This method measures the lecturer teaching workload.The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset.Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Development of a Negotiation Support Model for Value Management in Construction
Published 2009“…This methodology combines value analysis method using Function Analysis System Technique (FAST); Life Cycle Cost analysis, group decision analysis method based on Analytical Hierarchy Process (AHP), and Game theory-based agent system to develop a negotiation support. …”
Get full text
Get full text
Final Year Project -
10
PSO and Linear LS for parameter estimation of NARMAX/NARMA/NARX models for non-linear data / Siti Muniroh Abdullah
Published 2017“…Typically, parameter estimation is performed using various types of Least Squares (LS) algorithms due to its stable and efficient numerical computation. …”
Get full text
Get full text
Thesis -
11
Mitigation of harmonic current for balanced three-phase power system based on Extended Fryze Adaptive notch filter
Published 2023“…The algorithm's effectiveness in operation for the Shunt APF is validated through simulation using MATLAB/Simulink and experiment work by integrating the algorithm with DSPACE RS1104. …”
Get full text
Get full text
Get full text
Article -
12
Confidence intervals (CI) for concentration parameter in von Mises distribution and analysis of missing values for circular data / Siti Fatimah binti Hassan
Published 2015“…In this study, three imputation methods are considered namely expectation-maximization (EM) algorithm and data augmentation (DA) algorithm. …”
Get full text
Get full text
Thesis -
13
Parametric system identification and active vibration control of vibrational structures using genetic algorithm
Published 2007“…The sets of data obtained were utilised to develop ARX model using Least Squares (LS), Recursive Least Squares (RLS) and Genetic Algorithm (GA) methods. …”
Get full text
Get full text
Thesis -
14
A hybrid approach for personalized news recommendation with ordered clustering algorithm, rich user and news metadata
Published 2019“…HYPNER combines both the collaborative filtering-based and the Content-based filtering methods in its framework. …”
Get full text
Get full text
Thesis -
15
A robust firefly algorithm with backpropagation neural networks for solving hydrogeneration prediction
Published 2018“…The objective of this study, first, a firefly algorithm (FA) based on the k-fold cross-validation of BPNN has been suggested to predict data for keeping rapid learning and prevents the exponential increase in operating parts. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Application of system identification method coupled with evolutionary algorithms for the optimization of power consumption in a pem fuel cell propulsion system / Suhadiyana Hanapi
Published 2018“…Secondly, in this research, an empirical dynamic model of the PEM fuel cell system in vehicles was analyzed and validated using the system identification method……”
Get full text
Get full text
Book Section -
17
Applying empirical thresholding algorithm for a keystroke dynamics based authentication system
Published 2019“…In this paper, a novel algorithm is proposed to authenticate the legal users based on the empirical threshold values. …”
Get full text
Get full text
Get full text
Article -
18
Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID
Published 2013“…Compared to existing calibration procedure our method requires only few signal samples from RFID tags to be collected and rest of the database is recovered using path-loss prediction algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
19
Simulation-Based Power Estimation for High Throughput SHA-256 Design on Unfolding Transformation
Published 2022“…The algorithms are successfully designed using the Altera Quartus II platform. …”
Get full text
Get full text
Get full text
Proceeding -
20
Optimal Weighted Learning of PCA and PLS for Multicollinearity Discriminators and Imbalanced Groups in Big Data (S/O: 13224)
“…The designed algorithm was structured in k-fold cross-validation in attempt to minimise the biasness of the classification performance, measured using error rate. …”
Get full text
Get full text
Monograph
