Search Results - (( java implication _ algorithm ) OR ( knowledge evaluation between algorithm ))
Search alternatives:
- knowledge evaluation »
- evaluation between »
- between algorithm »
- java implication »
-
1
Disparity between theory & practice beyond the worst-case competitive analysis
Published 2019“…In an online problem, the algorithms is presented with a sequence on input in a serial fashion such that the algorithm does not have knowledge about the future inputs. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
Numerical analysis
Published 2008“…Much of this knowledge is in the form of algorithms for solving certain standard and widely used problems. …”
Get full text
Get full text
Get full text
Article -
3
Enhancement on the modified artificial bee colony algorithm to optimize the vehicle routing problem with time windows
Published 2022“…The proposed algorithm was evaluated using benchmark datasets comprising 56 VRPTW instances and 56 Pickup and Delivery Problems with Time Windows (PDPTW). …”
Get full text
Get full text
Thesis -
4
Fuzzy modeling of brain tissues in Bayesian segmentation of brain MR images
Published 2010“…Hence involving problem specific information and expert knowledge in designing segmentation algorithms seems to be useful. …”
Get full text
Get full text
Conference or Workshop Item -
5
Algorithmic approaches in model selection of the air passengers flows data
Published 2015“…Algorithm is an important element in any problem solving situation.In statistical modelling strategy, the algorithm provides a step by step process in model building, model testing, choosing the ‘best’ model and even forecasting using the chosen model.Tacit knowledge has contributed to the existence of a huge variability in manual modelling process especially between expert and non-expert modellers.Many algorithms (automated model selection) have been developed to bridge the gap either through single or multiple equation modelling.This study aims to evaluate the forecasting performances of several selected algorithms on air passengers flow data based on Root Mean Square Error (RMSE) and Geometric Root Mean Square Error (GRMSE).The findings show that multiple models selection performed well in one and two step-ahead forecast but was outperformed by single model in three step-ahead forecasts.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Risk assessment for safety and health algorithm for building construction in Oman
Published 2015“…The Wilcockson Ranked Test was applied to evaluate the differences between these two methods. …”
Get full text
Get full text
Thesis -
7
Old Jawi manuscript: Digital recognition / Zaidi Razak
Published 2016“…The evaluation results show that the proposed approach outperforms the algorithms of other recognition methods used for comparison. …”
Get full text
Get full text
Thesis -
8
Dissimilarity algorithm on conceptual graphs to mine text outliers
Published 2009“…The graphical text representation method such as Conceptual Graphs (CGs) attempts to capture the structure and semantics of documents.As such, they are the preferred text representation approach for a wide range of problems namely in natural language processing, information retrieval and text mining.In a number of these applications, it is necessary to measure the dissimilarity (or similarity) between knowledge represented in the CGs.In this paper, we would like to present a dissimilarity algorithm to detect outliers from a collection of text represented with Conceptual Graph Interchange Format (CGIF).In order to avoid the NP-complete problem of graph matching algorithm, we introduce the use of a standard CG in the dissimilarity computation.We evaluate our method in the context of analyzing real world financial statements for identifying outlying performance indicators.For evaluation purposes, we compare the proposed dissimilarity function with a dice-coefficient similarity function used in a related previous work.Experimental results indicate that our method outperforms the existing method and correlates better to human judgements. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
-
10
Hybrid Genetic Algorithm based Fuzzy Inference System for Data Regression
Published 2023Conference Paper -
11
Assessing the relationships between problem representation, capabilities and task performance fraud risk assessment by Nigerian deposit money banks' fraud investigators
Published 2021“…Thirteen out of nineteen hypotheses were evaluated through PLS-SEM algorithm and bootstrapping, whilst Mann-Whitney U Test was deployed to evaluate six hypotheses related to differences in ranking between forensic accountants and bank examiners. …”
Get full text
Get full text
Get full text
Thesis -
12
A Rough Set-Based Approach for Identifying and Replacing Missing Concepts in Incomplete Sentences in Computer Domain Texts
Published 2026thesis::master thesis -
13
Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli
Published 2021“…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. The application evaluation process is carried out by the developer's functionality test to ensure that there are no unnecessary issues in this app, especially in the main feature. …”
Get full text
Get full text
Thesis -
14
Analysis of K-Mean and X-Mean Clustering Algorithms Using Ontology-Based Dataset Filtering
Published 2021“…Our methodology incorporated ontology to filter the datasets and exploited Rapidminer environment to evaluate the performance of clustering algorithms. …”
Get full text
Get full text
Get full text
Article -
15
Combination of GREEN and SHRed AQM for short-lived traffic
Published 2008Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Cognitive knowledge-based model for adaptive feedback: A case in physics / Andrew Thomas Bimba
Published 2019“…This form of representation is achieved through the knowledge elicitation, knowledge bonding, and adaptive feedback algorithms. …”
Get full text
Get full text
Get full text
Thesis -
17
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Frameworks for a computational Isnad authentication and mechanism development
Published 2016“…This mechanism development includes the integration between Islamic knowledge and Information Technology (IT) which we proposed to develop an algorithm based on existing framework with a new elements of fact probing from Islamic knowledge.The accuracy of the authentication process on the domain of knowledge of hadith will be evaluated by domain experts through an interview.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
