Search Results - (( rate evaluation method algorithm ) OR ( using codification using algorithm ))

Refine Results
  1. 1

    Discriminative feature representation for Malay children’s speech recognition / Seyedmostafa Mirhassani by Mirhassani, Seyedmostafa

    Published 2015
    “…The second method performs optimization of filterbanks in cepstral feature extraction based on evolutionary algorithms. …”
    Get full text
    Get full text
    Thesis
  2. 2

    The Determination of Pile Capacity Using Artificial Neural-net: An Optimization Approach by Ab. Malik, Rosely, Jamil S., Mohamed

    Published 2001
    “…Using the developed algorithm, the safety measures involved are such as reliability index and the probability of failure; instead of only factor of safety if conventional deterministic approach is used. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Standardizing and weighting the evaluation criteria of many-objective optimization competition algorithms based on fuzzy delphi and fuzzy-weighted zero-inconsistency methods by Salih, Rawia Tahrir

    Published 2021
    “…The evaluation criteria of Many Objective Optimization algorithm (MaOO) play a critical role in evaluating the competition MaOO algorithms. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Improved Switching-Basedmedian Filter For Impulse Noise Removal by Teoh, Sin Hoong

    Published 2013
    “…Based on the evaluations from root mean square error (RMSE), false positive detection rate, false negative detection rate, mean structure similarity index (MSSIM), processing time, and visual inspection, it is shown that the proposed method is the best method when compared with seven other state-of-the art median filtering methods.…”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Optimising neural network training efficiency through spectral parameter-based multiple adaptive learning rates by Yeong, Lin Koay, Hong, Seng Sim, Yong, Kheng Goh, Sing, Yee Chua, Wah, June Leong

    Published 2024
    “…Selected datasets are used to evaluate the performance of the proposed method. The proposed algorithm is used to train the neural networks with di"erent hidden layer sizes and di"erent neurons. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Whole brain radiation therapy verification using 2D gamma analysis method by Zainodin, Nik Nurul Afina Wan

    Published 2020
    “…The CC algorithm gave the passing rate of 87.25% using 3 mm/3% (DTA/DD) method than PB algorithm with 79.95%. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Objective evaluation of speech enhancement using compressive sensing algorithm by Sulong, Amart, Gunawan, Teddy Surya, Khalifa, Othman Omran, Chebil, Jalel

    Published 2013
    “…Perceptual evaluation of speech quality (PESQ) is an objective evaluation of speech enhancement algorithm used to measure the enhanced speech quality. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10
  11. 11

    Satellite attitude determination utilizing measurement sensor data and kalman filtering by Samaan, Malak A., Abdelrahman, Mohammad

    Published 2006
    “…This algorithm utilizes the three axis rate gyros for the satellite angular rate data and star camera line-of-sight measurements. …”
    Get full text
    Get full text
    Article
  12. 12

    Non-fiducial based electrocardiogram biometrics with kernel methods by Hejazi, Maryamsadat

    Published 2017
    “…At classification level, Gaussian multi-class Support Vector Machine (SVM) with the One-Against-All (OAA) approach is proposed to evaluate verification performance rates of the feature extraction algorithms. …”
    Get full text
    Get full text
    Thesis
  13. 13

    An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi by Suhaimi, Hamizan

    Published 2021
    “…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem by Mohd Pozi, Muhammad Syafiq

    Published 2016
    “…There are two methods in dealing with imbalanced classification problem, which are based on data or algorithmic level. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    An enhanced opposition-based firefly algorithm for solving complex optimization problems by Ling, Ai Wong, Hussain Shareef, Azah Mohamed, Ahmad Asrul Ibrahim

    Published 2014
    “…This study introduces some methods to enhance the performance of original fi refl y algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Development and applications of metaheuristic algorithms in engineering design and structural optimization / Ali Sadollah by Ali, Sadollah

    Published 2013
    “…In addition, two novel optimization methods are developed and presented which are named the mine blast algorithm (MBA) and the water cycle algorithm (WCA). …”
    Get full text
    Get full text
    Thesis
  20. 20

    Analysis of artificial neural network and viola-jones algorithm based moving object detection by Rashidan, M. Ariff, Mohd Mustafah, Yasir, Zainal Abidin, Zulkifli, Zainuddin, N. Afiqah, A. Aziz, Nor Nadirah

    Published 2014
    “…The utilization of cascade architecture to the extracted features, benefits the algorithm. The algorithms have been tested on simulated events, and the more suitable algorithm with high detection rate is expected to be presented in this paper.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper