Search Results - (( based constructive method algorithm ) OR ( user evaluation method algorithm ))

Refine Results
  1. 1

    Prime-based method for interactive mining of frequent patterns by Nadimi-Shahraki, Mohammad-Hossein

    Published 2010
    “…The experimental results verify that the proposed method constructs the mining model independent of minsup once and this enable the model to be frequently mined. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Evaluation of intonation features on emphasized Malay words / Syazwani Nasaruddin by Nasaruddin, Syazwani

    Published 2017
    “…Activities in this section are, for testing part, 314 words from 2 different speakers are evaluated by using clustering method. WEKA is a set of machine learning algorithm for data mining task. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Multiple and solid data background scheme for testing static single cell faults on SRAM memories by Zakaria, Nor Azura

    Published 2013
    “…This method is evaluated in terms of function and performance differences between the proposed MTA and existing MTA using the User Defined Algorithm (UDA) available in the MBISTArchitect tool. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Innovation of marketing supply chain management model based on SICAS modeling by Mao, Rui, Liu, Youwei, Yang, Yida

    Published 2024
    “…A collaborative optimization model of the supply chain based on virtual inventory management is constructed to ensure the normal operation of the whole supply chain by deploying flexible inventory in the hands of customers, and the constructed model is solved by using an evolutionary algorithm based on indexes and an optimal solution sorting method based on regret theory. …”
    Get full text
    Get full text
    Article
  6. 6

    Comparison of CPU damage prediction accuracy between certainty factor and forward chaining techniques by Tri Ginanjar Laksana, Ade Rahmat Iskandar, Wan Nooraishya Wan Ahmad

    Published 2024
    “…The suggested algorithm yields the mean accuracy of the certainty factor approach in diagnosing computer damage utilizing the constructed system. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The formal verification is performed using BAN logic to prove the security and mutual authentications. The evaluation of the security of the proposed scheme is based on SVO logic to verify the security of the informal method. …”
    Get full text
    Get full text
    Thesis
  8. 8

    DurianCare: optimising trunk disease detection and precision farming in a mobile application / Muhammad Haziq Azmi by Azmi, Muhammad Haziq

    Published 2025
    “…The project will implement automated detection and disease management recommendation algorithms while evaluating the functionality and usability of the designed application. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Clustering of large time-series datasets using a multi-step approach / Saeed Reza Aghabozorgi Sahaf Yazdi by Yazdi, Saeed Reza Aghabozorgi Sahaf

    Published 2013
    “…Finally, the representatives are merged to construct the ultimate clusters. The model is then extended as an interactive model where the results garnered by the user increase in accuracy over time. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Design and development of an intuitive desktop application for rapid SARS-CoV-2 diagnosis using electrochemical potentiostat by Assaig, Faisal Ahmed, Gunawan, Teddy Surya, Nordin, Anis Nurashikin, Ab Rahim, Rosminazuin, Mohd Zain, Zainiharyati

    Published 2023
    “…Our primary focus revolved around creating a user-friendly desktop application, seamlessly integrating an algorithm that automates result generation for operators. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Sound quality classification of wood used for Sarawak traditional musical instrument- Sape / Wong Tee Hao by Wong , Tee Hao

    Published 2024
    “…This model was employed to build a MATLAB-based Sape sound quality classifier. Utilizing the Shapley Additive Explanations interpretation method, the analysis emphasized the importance of selected features in predicting wood acoustic quality, highlighting "Spectral Roll-off 85%" as the most crucial predictor of sound quality. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…These results indi�cate that the proposed method can improve the RAN learning algorithm towards the large-scale stream data processing. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Tag clouds algorithm with the inclusion of personality traits by Ahmad Affandi, Supli

    Published 2015
    “…In addition, a prototype was developed to evaluate the proposed algorithm. Then, user satisfaction was conducted in order to evaluate this prototype using Q-SAFI instruments. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Development Of The Readability Index Model For Young Adults With Reading Difficulties In Malay Language by Mohamad Hazawawi, Nur Amalina

    Published 2019
    “…Due to the unavailability of a tool that can measures the readability levels of Malay texts, this study proposed an online readability test tool in the Malay language to include readers who have reading difficulties by using an existing conventional calculation method developed by the Malay linguists. This formula was then transformed into a computing algorithm to detect the difficult words in Malay texts. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18
  19. 19

    Adaptive method to improve web recommendation system for anonymous users by Almurtadha, Yahya Mohammed

    Published 2011
    “…The second is Adaptive Web page Recommendation System (AWRS) which combines the classification algorithm of iPACT in addition to the ability of adaptive recommending due to the changes of the users‟ interests and weighting methods to deal with unvisited or new added pages. …”
    Get full text
    Get full text
    Thesis
  20. 20

    An evolutionary based features construction methods for data summarization approach by Rayner Alfred, Suraya Alias, Chin, Kim On

    Published 2015
    “…In this work, we empirically compare the predictive accuracies of classification tasks based on the proposed feature construction methods and also the existing feature construction methods. …”
    Get full text
    Get full text
    Research Report