Search Results - (( construct evaluation process algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- construct evaluation »
- process algorithm »
- java application »
-
1
Ant colony optimization based subset feature selection in speech processing: Constructing graphs with degree sequences
Published 2024journal::journal article -
2
-
3
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. …”
Get full text
Get full text
Get full text
Thesis -
4
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…Therefore, FRA using FRT was constructed and the performance of the FRA was evaluated. …”
Get full text
Get full text
Get full text
Thesis -
5
-
6
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
7
An evolutionary based features construction methods for data summarization approach
Published 2015“…These methods are proposed to improve the descriptive accuracy of the summarized data. In the process of summarizing relational data, a genetic algorithm is also applied and several feature scoring measures are evaluated in order to find the best set of relevant constructed features. …”
Get full text
Get full text
Research Report -
8
A tool for addressing construct identity in literature reviews and meta-analyses
Published 2016“…Through the adaptation and combination of different natural language processing (NLP) algorithms, six designs were created and evaluated against human expert decisions. …”
Get full text
Get full text
Get full text
Article -
9
A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh
Published 2021“…The second evaluation divides into three scenarios. The first one evaluates Coalition-Based Index-Tree framework independently, without any effect from Dynamic-Coalition framework and Static-Coalition algorithm. …”
Get full text
Get full text
Get full text
Thesis -
10
Dynamic Bayesian networks and variable length genetic algorithm for designing cue-based model for dialogue act recognition
Published 2010“…To evaluate the proposed approaches of design, three stages of experiments have been conducted. …”
Get full text
Get full text
Article -
11
Non-fiducial based electrocardiogram biometrics with kernel methods
Published 2017“…A new non-fiducial approach is proposed for feature extraction. This approach constructs an algorithm by combining autocorrelation (AC) and Kernel Principal Component Analysis (KPCA) techniques. …”
Get full text
Get full text
Thesis -
12
Optimization of Prediction Error in CO2 Laser Cutting process by Taguchi Artificial Neural Network Hybrid with Genetic algorithm
Published 2013“…The simulation results were evaluated and verified with the experiment. In some cases, the prediction errors of Taguchi ANN model was larger than 10 even with Levenberg Marquardt training algorithm. …”
Get full text
Article -
13
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
14
Hybrid BLEU Algorithm For Structured Exam Management System
Published 2008“…Teaching and learning process is very essential in education. To evaluate teaching and learning process, many techniques can be applied for instance quiz, test, practical and so forth. …”
Get full text
Get full text
Get full text
Thesis -
15
Support Vector Machines (SVM) in Test Extraction
Published 2006“…Text categorization is the process of grouping documents or words into predefined categories. …”
Get full text
Get full text
Final Year Project -
16
Support Vector Machines (SVM) in Test Extraction
Published 2006“…Text categorization is the process of grouping documents or words into predefined categories. …”
Get full text
Get full text
Final Year Project -
17
Chebyshev approximation of discrete polynomials and splines
Published 2004“…These algorithms use either cubic splines or Lagrange polynomials to construct the approximation function. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Chebyshev approximation of discrete polynomials and splines
Published 2004“…These algorithms use either cubic splines or Lagrange polynomials to construct the approximation function. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Assessment of CDA and Morphlink-C Algorithms method in crack detection using [Multirotor DJ1 phantom 3] image / Muhammad Hafizi Abd Rahaim
Published 2018“…These data model then was evaluated their availability of processed image to detect crack using CDA and MorphLink-C algorithms. …”
Get full text
Get full text
Thesis -
20
An enhanced supplier selection model based on optimized analytic network process towards sustainable information technology outsourcing
Published 2022“…Findings from the study was used to construct evaluation criteria and become datasets for ESS. …”
Get full text
Get full text
Get full text
Thesis
