Search Results - (( based constructive method algorithm ) OR ( user evaluation method algorithm ))
Search alternatives:
- based constructive »
- evaluation method »
- method algorithm »
- user evaluation »
-
1
Prime-based method for interactive mining of frequent patterns
Published 2010“…The experimental results verify that the proposed method constructs the mining model independent of minsup once and this enable the model to be frequently mined. …”
Get full text
Get full text
Thesis -
2
Evaluation of intonation features on emphasized Malay words / Syazwani Nasaruddin
Published 2017“…Activities in this section are, for testing part, 314 words from 2 different speakers are evaluated by using clustering method. WEKA is a set of machine learning algorithm for data mining task. …”
Get full text
Get full text
Thesis -
3
Multiple and solid data background scheme for testing static single cell faults on SRAM memories
Published 2013“…This method is evaluated in terms of function and performance differences between the proposed MTA and existing MTA using the User Defined Algorithm (UDA) available in the MBISTArchitect tool. …”
Get full text
Get full text
Thesis -
4
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
5
Innovation of marketing supply chain management model based on SICAS modeling
Published 2024“…A collaborative optimization model of the supply chain based on virtual inventory management is constructed to ensure the normal operation of the whole supply chain by deploying flexible inventory in the hands of customers, and the constructed model is solved by using an evolutionary algorithm based on indexes and an optimal solution sorting method based on regret theory. …”
Get full text
Get full text
Article -
6
Comparison of CPU damage prediction accuracy between certainty factor and forward chaining techniques
Published 2024“…The suggested algorithm yields the mean accuracy of the certainty factor approach in diagnosing computer damage utilizing the constructed system. …”
Get full text
Get full text
Get full text
Article -
7
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The formal verification is performed using BAN logic to prove the security and mutual authentications. The evaluation of the security of the proposed scheme is based on SVO logic to verify the security of the informal method. …”
Get full text
Get full text
Thesis -
8
DurianCare: optimising trunk disease detection and precision farming in a mobile application / Muhammad Haziq Azmi
Published 2025“…The project will implement automated detection and disease management recommendation algorithms while evaluating the functionality and usability of the designed application. …”
Get full text
Get full text
Thesis -
9
Clustering of large time-series datasets using a multi-step approach / Saeed Reza Aghabozorgi Sahaf Yazdi
Published 2013“…Finally, the representatives are merged to construct the ultimate clusters. The model is then extended as an interactive model where the results garnered by the user increase in accuracy over time. …”
Get full text
Get full text
Thesis -
10
Design and development of an intuitive desktop application for rapid SARS-CoV-2 diagnosis using electrochemical potentiostat
Published 2023“…Our primary focus revolved around creating a user-friendly desktop application, seamlessly integrating an algorithm that automates result generation for operators. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
Sound quality classification of wood used for Sarawak traditional musical instrument- Sape / Wong Tee Hao
Published 2024“…This model was employed to build a MATLAB-based Sape sound quality classifier. Utilizing the Shapley Additive Explanations interpretation method, the analysis emphasized the importance of selected features in predicting wood acoustic quality, highlighting "Spectral Roll-off 85%" as the most crucial predictor of sound quality. …”
Get full text
Get full text
Get full text
Thesis -
12
Resource allocation based on interference coordination for Multicast-Broadcast Single Frequency Network (MBSFN) / Mohd Fahmi Azman
Published 2013“…The method to minimize the interference has been studied carefully. …”
Get full text
Get full text
Thesis -
13
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…These results indi�cate that the proposed method can improve the RAN learning algorithm towards the large-scale stream data processing. …”
Get full text
Get full text
Thesis -
14
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…In addition, a prototype was developed to evaluate the proposed algorithm. Then, user satisfaction was conducted in order to evaluate this prototype using Q-SAFI instruments. …”
Get full text
Get full text
Get full text
Thesis -
15
Development Of The Readability Index Model For Young Adults With Reading Difficulties In Malay Language
Published 2019“…Due to the unavailability of a tool that can measures the readability levels of Malay texts, this study proposed an online readability test tool in the Malay language to include readers who have reading difficulties by using an existing conventional calculation method developed by the Malay linguists. This formula was then transformed into a computing algorithm to detect the difficult words in Malay texts. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
-
17
Recommendation System Model For Decision Making in the E-Commerce Application
Published 2024thesis::doctoral thesis -
18
A hybrid Method Of Centroid-Based Clustering And Meta-Heuristic For Personalized Web Search
Published 2024thesis::doctoral thesis -
19
Adaptive method to improve web recommendation system for anonymous users
Published 2011“…The second is Adaptive Web page Recommendation System (AWRS) which combines the classification algorithm of iPACT in addition to the ability of adaptive recommending due to the changes of the users‟ interests and weighting methods to deal with unvisited or new added pages. …”
Get full text
Get full text
Thesis -
20
An evolutionary based features construction methods for data summarization approach
Published 2015“…In this work, we empirically compare the predictive accuracies of classification tasks based on the proposed feature construction methods and also the existing feature construction methods. …”
Get full text
Get full text
Research Report
