Search Results - (( rate evaluation using algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Evaluation of a spacecraft attitude and rate estimation algorithm by Abdullah, Mohammad Nizam Filipski, Varatharajoo, Renuganth

    Published 2010
    “…Purpose: This paper aims to present the development and performance evaluation of an attitude and rate estimation algorithm using an extended Kalman filter structure based on a body‐referenced representation of the state. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Validation on an enhanced dendrite cell algorithm using statistical analysis by Mohamad Mohsin, Mohamad Farhan, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Abd Wahab, Mohd Helmy

    Published 2017
    “…In this study, we evaluated the performance of the enhanced algorithm called dendrite cell algorithm using sensitivity, specificity, false positive rate, and accuracy and validated the result using parametric and non parametric statistical significant tests. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    Scheduling tight deadlines for scientific workflows in the cloud by Bajaher, Awadh Salem Saleh

    Published 2018
    “…The performance evaluation is done using two different performance metrics, success rate and normalized cost. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Objective evaluation of speech enhancement using compressive sensing algorithm by Sulong, Amart, Gunawan, Teddy Surya, Khalifa, Othman Omran, Chebil, Jalel

    Published 2013
    “…Perceptual evaluation of speech quality (PESQ) is an objective evaluation of speech enhancement algorithm used to measure the enhanced speech quality. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    Prediction of football club winning rate using Bayesian model algorithm / Adam Khairul Anuar by Khairul Anuar, Adam

    Published 2023
    “…Objectives involve studying, developing, and evaluating the accuracy of a Bayesian model for predicting winning rates. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Evaluation of Visual Network Algorithms on Historical Documents by Khairunnisa, Binti Ibrahim

    Published 2020
    “…The framework has been used to evaluate three graph layout and three graph clustering algorithms on the historical SAGA dataset. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Strategic oscillation for exploitation and exploration of ACS algorithm for job scheduling in static grid computing by Alobaedy, Mustafa Muwafak, Ku-Mahamud, Ku Ruhana

    Published 2015
    “…Exploitation and exploration mechanisms are the main components in metaheuristics algorithms. These mechanisms are implemented explicitly in ant colony system algorithm.The rate between the exploitation and exploration mechanisms is controlled using a parameter set by the users of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Whole brain radiation therapy verification using 2D gamma analysis method by Zainodin, Nik Nurul Afina Wan

    Published 2020
    “…Furthermore, the accuracy of both algorithms was evaluated using EBT3 film by comparing the gamma index passing rate in a Verisoft software. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband by Shamshirband, Shahaboddin

    Published 2014
    “…Adaptive optimization techniques such as fuzzy logic controller (FLC), reinforcement learning are discussed in this thesis in order to adopt Q-leaning algorithm to FLCs. We investigate the detection capability based on the fuzzy Q-learning (FQL) algorithm and evaluate it using distribute denial of service attacks (DDoS). …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Performance evaluation of automatic number plate recognition on android smartphone platform by Gunawan, Teddy Surya, Mutholib, Abdul, Kartiwi, Mira

    Published 2017
    “…On the other hand, the traditional algorithm using template matching only obtained 83.7% recognition rate with 0.98 second processing time. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19

    Multi-Objectives Memetic Discrete Differential Evolution Algorithm for Solving the Container Pre-Marshalling Problem by Mustafa, Hossam M. J., Ayob, Masri, Ahmad Nazri, Mohd Zakree, Abu-Taleb, Sawsan

    Published 2019
    “…In addition, it improves the exploration and exploitation capabilities of the algorithm. The standard pre-marshalling benchmark dataset (i.e., Bortfeldt-Forster) is used to evaluate the effectiveness of the proposed algorithm. …”
    Get full text
    Get full text
    Article
  20. 20

    Performance evaluation of chaos-enhanced stochastic fractal search algorithm using constrained engineering design problems by Tuan Abdul Rahman, Tuan Ahmad Zahidi, Abdul Jalil, Nawal Aswan, As'arry, Azizan, Raja Ahmad, Raja Mohd Kamil

    Published 2017
    “…This paper presents the performance evaluation of Chaos-enhanced Stochastic Fractal Search (CFS) algorithms for solving three different constrained engineering design optimization problems which extensively were used in the literature as a benchmarking task. …”
    Get full text
    Get full text
    Conference or Workshop Item