Search Results - (( based constructive method algorithm ) OR ( data validation using algorithm ))

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Using algorithmic taxonomy to evaluate lecturer workload by Hashim, Ruhil Hayati, Abdul Hamid, Jamaliah, Selamat, Mohd Hasan, Ibrahim, Hamidah, Abdullah, Rusli, Mohayidin, Mohd Ghazali

    Published 2006
    “…The Lecturer profile contains information of lecturer teaching load, research, publication and many more. We constructed an algorithmic taxonomy based on the lecturer profile data to measure lecturer teaching workload. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata by Mohamad Hata, Mohsen

    Published 2019
    “…The protocol defines the procedures which engage two layers of deniability techniques; namely Secret Sharing and Valid Fake Messages. Secret Sharing technique is used to generate Fake Asymmetric Keys by using LaGrange Polynomial Interpolation formula and RSA algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Dynamic determinant matrix-based block cipher algorithm by Juremi, Julia

    Published 2018
    “…This research also proposes a new method namely RotateSwapDeterminant function that uses rotation and swapping of the bit based on the 4x4 determinant computations and will act as the permutation layer in the DDBC algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal by Abdul Hamid, Jamaliah, Mohayidin, Mohd Ghazali, Selamat, Mohd Hasan, Ibrahim, Hamidah, Abdullah, Rusli, Hashim, Ruhil Hayati

    Published 2006
    “…The Lecturer profile contains information lecturer teaching, research, publication and many more. We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Confidence intervals (CI) for concentration parameter in von Mises distribution and analysis of missing values for circular data / Siti Fatimah binti Hassan by Hassan, Siti Fatimah

    Published 2015
    “…In this study, three imputation methods are considered namely expectation-maximization (EM) algorithm and data augmentation (DA) algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A combinatory algorithm of univariate and multivariate gene selection by Mahmoodian, Sayed Hamid, Marhaban, Mohammad Hamiruce, Abdul Rahim, Raha, Rosli, Rozita, Saripan, M. Iqbal

    Published 2009
    “…Microarray technology has provided the means to monitor the expression levels of a large number of genes simultaneously. Constructing a classifier based on microarray data has emerged as an important problem for diseases such as cancer. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal by Abdul Hamid, Jamaliah, Mohayidin, Mohd Ghazali, Selamat, Mohd Hassan, Ibrahim, Hamidah, Abdullah, Rusli, Hashim, Ruhil Hayati

    Published 2006
    “…Lecturer workload at universities includes three major categories: teaching, research and services.Teaching workload is influence by various factors such as level taught courses, number of student, credit and contact hour and off campus or on campus course design.The UPM has a KM Portal that contains sets of metadata on lecturer profile and knowledge assets.The Lecturer profile contains information lecturer teaching, research, publication and many more.We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload.This method measures the lecturer teaching workload.The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset.Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    ECG encryption enhancement with multi-layers of AES and DNA computing by Kh-Madhloom, Jamal

    Published 2023
    “…MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    PSO and Linear LS for parameter estimation of NARMAX/NARMA/NARX models for non-linear data / Siti Muniroh Abdullah by Abdullah, Siti Muniroh

    Published 2017
    “…Typically, parameter estimation is performed using various types of Least Squares (LS) algorithms due to its stable and efficient numerical computation. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Parametric system identification and active vibration control of vibrational structures using genetic algorithm by Mohammad Sofi @ Aziz, Azfi Zaihan

    Published 2007
    “…The sets of data obtained were utilised to develop ARX model using Least Squares (LS), Recursive Least Squares (RLS) and Genetic Algorithm (GA) methods. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Optimal Weighted Learning of PCA and PLS for Multicollinearity Discriminators and Imbalanced Groups in Big Data (S/O: 13224) by Mahat, Nor Idayu, Engku Abu Bakar, Engku Muhammad Nazri, Zakaria, Ammar, Mohd Nazir, Mohd Amril Nurman, Misiran, Masnita

    “…The designed algorithm was structured in k-fold cross-validation in attempt to minimise the biasness of the classification performance, measured using error rate. …”
    Get full text
    Get full text
    Monograph
  13. 13
  14. 14

    A robust firefly algorithm with backpropagation neural networks for solving hydrogeneration prediction by Hammid, Ali Thaeer, M. H., Sulaiman, Awad, Omar I.

    Published 2018
    “…The objective of this study, first, a firefly algorithm (FA) based on the k-fold cross-validation of BPNN has been suggested to predict data for keeping rapid learning and prevents the exponential increase in operating parts. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID by Narzullaev, Anvar, Selamat, Mohd Hasan

    Published 2013
    “…Compared to existing calibration procedure our method requires only few signal samples from RFID tags to be collected and rest of the database is recovered using path-loss prediction algorithm.…”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Variable Neighborhood Descent and Whale Optimization Algorithm for Examination Timetabling Problems at Universiti Malaysia Sarawak by Emily Sing Kiang, Siew

    Published 2025
    “…A constructive algorithm was developed to generate an initial feasible solution, which was subsequently refined using two primary approaches to evaluate their efficiency: Iterative Threshold Pipe Variable Neighborhood Descent (IT-PVND), and a modified Whale Optimization Algorithm (WOA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Complex word identification model for lexical simplification in the Malay language for non-native speakers by Salehah, Omar

    Published 2023
    “…The model is evaluated based on a state-of-the-art Malay corpus. This corpus is divided into training and testing data using k-fold cross-validation, where k=10. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks / Wang Jie ... [et al.] by Wang, Jie, Mohd. Shah, Mohd. Kamal, Choong, Wai Heng, Al-Azad, Nahiyan

    Published 2024
    “…Simulated data are generated using ANSYS software by using models of semi-circular defects in steel pipes, producing magnetic leakage signals of varying intensities. …”
    Get full text
    Get full text
    Article
  19. 19

    Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks by Wang Jie, Mohd. Kamal Mohd. Shah, Choong Wai Heng, Nahiyan Al-Azad

    Published 2024
    “…Simulated data are generated using ANSYS software by using models of semi-circular defects in steel pipes, producing magnetic leakage signals of varying intensities. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Quantitative analysis of NaCl, NaOH, and β-phenylethylamine in water using ultraviolet spectroscopy coupled with partial least squares and net analyte preprocessing by Tang, Xiaojun Tang, Tong, Angxin Tong, Zhang, Feng, Wang, Bin

    Published 2020
    “…Therefore, UV spectroscopy coupled with PLS models and NAP algorithm can be considered as an effective method to determine the concentration of NaCl, NaOH and PEA in the natural water…”
    Get full text
    Get full text
    Get full text
    Article