Search Results - (( java adaptation optimization algorithm ) OR ( user validation using algorithm ))
Search alternatives:
- adaptation optimization »
- validation using »
- java adaptation »
- user validation »
- using algorithm »
-
1
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
2
HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION
Published 2011Get full text
Get full text
Thesis -
3
Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi
Published 2017“…Testing of the application are using 10-Fold Cross Validation technique. 90% of the data be used as a training and another 10% be used for the testing part. …”
Get full text
Get full text
Thesis -
4
Prediction of Machine Failure by Using Machine Learning Algorithm
Published 2019“…The columns consist of the variables that record the reading of machine sensor tags. Validation for the model is analyzed by using validation testing data and cross validation. …”
Get full text
Get full text
Final Year Project -
5
Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model
Published 2001“…The correlation based model validity tests are used to validate the identified fuzzy model.…”
Get full text
Get full text
Get full text
Article -
6
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
7
Job position prediction based on skills and experience using machine learning algorithm / Ezaryf Hamdan
Published 2024“…Cross-validation techniques are employed to validate the model's performance and ensure robustness. …”
Get full text
Get full text
Thesis -
8
Outdoor User Location over 802.11 Ad-hoc Network
Published 2006“…At the end of this work, the site testing has validated that this algorithm can be used to determine the user location in outdoor environment with considerable accuracy.…”
Get full text
Get full text
Final Year Project -
9
Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory
Published 2011“…A user-friendly Graphical User Interface (GUI) is developed using Microsoft Visual Basic software to load and display the algorithm under test and display the result. …”
Get full text
Get full text
Thesis -
10
Text Extraction Algorithm for Web Text Classification
Published 2010“…A text extraction prototype is built using Visual C# 2008 to validate the algorithm. It is a windows application mixed with web connection protocol. …”
Get full text
Get full text
Get full text
Thesis -
11
Automatic generation of user-defined test algorithm description file for memory BIST implementation
Published 2022“…It can be used by implementing a standard testing algorithm available in the EDA tool library or a user-defined algorithm (UDA). …”
Get full text
Get full text
Get full text
Article -
12
Applying empirical thresholding algorithm for a keystroke dynamics based authentication system
Published 2019“…The password training database for each user is constructed using the extracted features. …”
Get full text
Get full text
Get full text
Article -
13
New filtering framework for web personalization search / Anitawati Mohd Lokman and Aishah Ahmad
Published 2012“…This shows that search engine will rank pages using general user's interest, and neglect the aspect of personalization involving user's interest. …”
Get full text
Get full text
Research Reports -
14
Influence maximisation towards target users on social networks for information diffusion
Published 2018“…Influence maximisation has been an area of active research in recent years.This study aims to extend the fundamental influence maximisation problem (IMP) with respect to a set of target users on a social network.It is important to aim at the target users to speed up the rate of information diffusion and reduce the information diffusion cost.In doing so, the MITU algorithm was formulated and compared with state of the art algorithms.Publicly available datasets were used in validating the proposed algorithm.It was found that the MITU identified all target nodes while significantly lowering the information diffusion cost function (IDCF) by up to 79%.The influence overlap problem was equally identified in the heuristic algorithm where the seed set size was reduced by an average of six times.Furthermore, the random influencer selection identifies target nodes better than the betweenness and PageRank centralities.The findings could help organisations to reach target users on social media in the shortest cycle.…”
Get full text
Get full text
Get full text
Article -
15
Influence maximization towards target users on social networks for information diffusion
Published 2018“…Publicly available datasets were used in validating the proposed algorithm. It was found that the MITU identified all target nodes while significantly lowering the information diffusion cost function (IDCF) by up to 79%. …”
Get full text
Get full text
Get full text
Article -
16
A graphical user interface application for continuous-time identification of dynamical system
Published 2002“…A validation process had been implemented using cross validation process. …”
Get full text
Get full text
Get full text
Article -
17
Proposal of meta-requirement approach to analyze requirements specification completeness
Published 2018“…The objectives of this research are to identify the major factors in validating user requirements, development of a reverse engineered meta-requirement algorithm and validating with expert panel in requirements engineering of the algorithm usefulness. …”
Get full text
Get full text
Conference or Workshop Item -
18
Meta-requirement method towards analyzing completeness of requirements specification
Published 2018“…The objectives of this research are to identify the major factors in validating user requirements, development of a reverse engineered meta-requirement algorithm and validating with expert panel in requirements engineering of the algorithm usefulness. …”
Get full text
Get full text
Get full text
Book Chapter -
19
Maximum-largest weighted delay first algorithm for heterogeneous traffic in 4G networks
Published 2018“…Packet Loss Ratio (PLR), and Mean User Throughput performance measures were used to validate the performance of M-LWDF algorithm against other algorithms using similar mobile environment. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis
