Search Results - (( software validation means algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Cluster Analysis of Data Points using Partitioning and Probabilistic Model-based Algorithms by Raheem, Ajiboye Adeleke, Hauwau, Isah-Kebbe, O., Oladele Tinuke

    Published 2014
    “…Experiments were conducted using k-means, k-medoids and EM-algorithm. The study implements each algorithm using RapidMiner Software and the results generated was validated for correctness in accordance to the concept of external criteria method. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    System identification using Extended Kalman Filter by Alias, Ahmad Hafizi

    Published 2017
    “…In order to evaluate the performance of the EKF learning algorithm, the proposed algorithm validation were analyzed using model validation methods as a checker such as One Step Ahead (OSA) and correlation coefficient (R2). …”
    Get full text
    Get full text
    Student Project
  5. 5
  6. 6

    Effect of adopting different dispatching rules on the mean flow time in a two machine batch-shop problem by Abdelraheem Elhaj, Hazir Farouk

    Published 2005
    “…This means that it is highly unlikely to find a polynomial algorithm to solve the problem. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Visualization of dengue incidences using expectation maximization (EM) algorithm by Mathur, N., Asirvadam, V.S., Dass, S.C., Gill, B.S.

    Published 2017
    “…Along with the prediction modeling on data using centroid model and distribution model based on K-means and Expectation Maximization (EM) algorithms respectively. …”
    Get full text
    Get full text
    Article
  10. 10

    Estimating Marine CSEM Responses Using Gaussian Process Regression Based on Synthetic Models by Mohd Aris, M.N., Daud, H., Mohd Noh, K.A., Dass, S.C.

    Published 2022
    “…For the validation, the mean absolute deviation (MAD), mean squared error (MSE) and root mean squared error (RMSE) between the 2D GP model and the CST outputs (i.e., true values) at the unobserved resistivities are calculated. …”
    Get full text
    Get full text
    Article
  11. 11

    A Fuzzy Hybrid GA-PSO Algorithm for Multi-Objective AGV Scheduling in FMS by Mousavi, M., Yap, Hwa Jen, Musa, S.N., Md Dawal, Siti Zawiah

    Published 2017
    “…The model evaluation and validation was conducted through simulation via Flexsim software. …”
    Get full text
    Get full text
    Article
  12. 12

    Development of an imputation technique - INI for software metric database with incomplete data by Wasito, Ito, Olanrewaju, Rashidah F.

    Published 2007
    “…Software metrics are numerical data that provides a quantitative basis for the development and validation of models, and effective measurement of the software development process. …”
    Get full text
    Get full text
    Get full text
    Book Section
  13. 13

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16
  17. 17

    Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed by Borujeni, Sattar Chavoshi

    Published 2012
    “…This approach was based on fuzzy expert system (FES) using Fuzzy Toolbox of MATLAB software. Genetic algorithm (GA) was employed to adjust parameters of FES and optimize the system. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Multifunctional optimized group method data handling for software effort estimation by Arbain, Siti Hajar

    Published 2022
    “…Group Method of Data Handling (GMDH) algorithms have been widely used for modelling and identifying complex systems and potentially applied in software effort estimation. …”
    Get full text
    Get full text
    Thesis
  20. 20