Search Results - (( java application reoptimize algorithm ) OR ( set validation using algorithm ))

Refine Results
  1. 1

    Text Extraction Algorithm for Web Text Classification by Theab, Mustafa Muwafak

    Published 2010
    “…A text extraction prototype is built using Visual C# 2008 to validate the algorithm. It is a windows application mixed with web connection protocol. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    A Test Vector Minimization Algorithm Based On Delta Debugging For Post-Silicon Validation Of Pcie Rootport by Toh , Yi Feng

    Published 2017
    “…However, manual debugging is still widely used in post-silicon validation and is a major bottleneck in the validation process. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Efficient genetic partitioning-around-medoid algorithm for clustering by Garib, Sarmad Makki Mohammed

    Published 2019
    “…The rest sets of experiments carried out to evaluate the proposed algorithms. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…The proposed algorithms (Priority Dynamic Quantum Time and Multi Priority Dynamic Quantum Time Algorithms) are implemented using JAVA programming language and validated using Key Performance Indicators equations. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure by Othman, Mohamad Lutfi

    Published 2011
    “…The discovered decision algorithm and association rule from the Rough-Set based data mining had been compared with and successfully validated by those discovered using the benchmarking Decision-Tree based data mining strategy. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Optimized clustering with modified K-means algorithm by Alibuhtto, Mohamed Cassim

    Published 2021
    “…Besides, some real data sets were examined to validate the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    A Comparison Study On Pca_Modular Pca And Lda For Face Recognition by Cheah, Boon Wah

    Published 2017
    “…The performance of these face recognition algorithms will be evaluated by 10-fold cross validation using ORL database. …”
    Get full text
    Get full text
    Monograph
  9. 9

    An adaptive flower pollination algorithm for minimizing software testing redundancy by M. N., Kabir, Ali, Jahan, Alsewari, Abdulrahman A., Kamal Z., Zamli

    Published 2017
    “…Comparison shows that our algorithm performs slightly better than the existing algorithms and thus, the proposed algorithm can potentially be used by researchers and test engineers to obtain optimal test suite requiring the minimum time for software testing.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji by Muhammad Illyas, Abdul Muhji

    Published 2018
    “…In this study, 227 volumes of brain CT images were used to develop and validate the CAD. The new develop algorithm is set to register image of brain patient in order to determine the rotation angle for brain realignment. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Prediction of blood-brain barrier permeability of compounds by machine learning algorithms by Feng, Tan wei, Raihana Zahirah, Edros, Ngahzaifa, Ab Ghani, Siti Umairah, Mokhtar, Dong, Ruihai

    Published 2024
    “…Since the CNS is often inaccessible to many complex procedures and performing in-vitro permeability studies for thousands of compounds can be laborious, attempts were made to predict the permeation of compounds through BBB by implementing the Machine Learning (ML) approach. In this work, using the KNIME Analytics platform, 4 predictive models were developed with 4 ML algorithms followed by a ten-fold cross-validation approach to predict the external validation set. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Evaluation of Lightning Current Using Inverse Procedure Algorithm. by Ab Kadir, Mohd Zainal Abidin, Izadi, Mahdi, Askari, Mohamad Tolou, Hajikhani, Maryam

    Published 2013
    “…The proposed method can be used for preparing of current data bank that is very useful for considering on lightning effects on the power lines and setting appropriate protection levels on the power systems.…”
    Get full text
    Get full text
    Article
  14. 14

    A Distributed Energy Aware Connected Dominating Set Technique for Wireless Sensor Networks by Abd Aziz, Azrina, Sekercioglu, Ahmet

    Published 2012
    “…The performance of our algorithm is confirmed through simulations and validated against two leading CDS algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    An Apriori-based Data Analysis on Suspicious Network Event Recognition by Jian, Z., Sakai, H., Watada, J., Roy, A., Hassan, M.H.B.

    Published 2019
    “…Apriori-based rule generators, which are powered by the DIS-Apriori algorithm and the NIS-Apriori algorithm, are applied to analyze the data sets available in the IEEE BigData 2019 Cup: Suspicious Network Event Recognition. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Exploratory analysis with association rule mining algorithms in the retail industry / Alaa Amin Hashad ... [et al.] by Hashad, Alaa Amin, Khaw, Khai Wah, Alnoor, Alhamzah, Chew, Xin Ying

    Published 2024
    “…To address this, missing customer IDs are filled with the last valid ID, assuming repeated purchases. The FP-Growth algorithm was found to be faster and more effective than the Apriori algorithm in extracting frequent item sets and generating association rules. …”
    Get full text
    Get full text
    Article
  17. 17

    Meta-requirement method towards analyzing completeness of requirements specification by Muhamad Idaham, Umar Ong, Mohamed Ariff, Ameedeen, Imran Edzereiq, Kamarudin

    Published 2018
    “…The objectives of this research are to identify the major factors in validating user requirements, development of a reverse engineered meta-requirement algorithm and validating with expert panel in requirements engineering of the algorithm usefulness. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  18. 18

    Proposal of meta-requirement approach to analyze requirements specification completeness by Muhamad Idaham, Umar Ong, M. A., Ameedeen

    Published 2018
    “…The objectives of this research are to identify the major factors in validating user requirements, development of a reverse engineered meta-requirement algorithm and validating with expert panel in requirements engineering of the algorithm usefulness. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Green building valuation based on machine learning algorithms / Thuraiya Mohd ... [et al.] by Mohd, Thuraiya, Jamil, Syafiqah, Masrom, Suraya, Ab Rahim, Norbaya

    Published 2021
    “…This paper provides an empirical study report, that building price predictions are based on green building and other general determinants. This experiment used five common machine learning algorithms namely 1) Linear Regressor, 2) Decision Tree Regressor, 3) Random Forest Regressor, 4) Ridge Regressor and 5) Lasso Regressor tested on a real estate data-set of covering Kuala Lumpur District, Malaysia. 3 set of experiments was conducted based on the different feature selections and purposes The results show that the implementation of 16 variables based on Experiment 2 has given a promising effect on the model compare the other experiment, and the Random Forest Regressor by using the Split approach for training and validating data-set outperformed other algorithms compared to Cross-Validation approach. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Switching algorithm to avoid attitude representation singularity by Okasha, Mohamed Elsayed Aly Abd Elaziz, Newman, Brett

    Published 2009
    “…The algorithm is numerically demonstrated and validated by several nonlinear six degree of freedom simulation tests.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper