Search Results - (( using evaluation method algorithm ) OR ( software validation using algorithm ))
Search alternatives:
- software validation »
- evaluation method »
- using evaluation »
- method algorithm »
- validation using »
- using algorithm »
-
1
Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi
Published 2017“…The more the algorithm use in a project the better performance will be in result.…”
Get full text
Get full text
Thesis -
2
Evaluation and Comparative Analysis of Feature Extraction Methods on Image Data to increase the Accuracy of Classification Algorithms
Published 2024“…The classification algorithm used in this research is the Convolutional Neural Network (CNN) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Bats echolocation-inspired algorithms for global optimisation problems
Published 2016“…The algorithm is a hybrid algorithm that operates using dual level search strategy that takes merits of a particle swarm optimisation algorithm and a modified adaptive bats sonar algorithm. …”
Get full text
Get full text
Thesis -
4
Adopting Jaya Algorithm for Team Formation Problem
Published 2020“…To evaluate the efficiency of the Jaya Algorithm (JA) against another metaheuristic algorithm, Sine-Cosine Algorithm (SCA), both algorithms are tested and assessed for the TF problem solution using an ACM dataset containing experts and their skills. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Evaluations of oil palm fresh fruit bunches maturity degree using multiband spectrometer
Published 2017“…Furthermore, the Lazy-IBK algorithm have been validated to produce the best classifier model, with the machine learning algorithm performance of 65.26%, recall of 65.3%, and 65.4% F-measured as compared to other evaluated machine learning classifier algorithms proposed within the WEKA data mining algorithm. …”
Get full text
Get full text
Get full text
Thesis -
6
Feature fusion using a modified genetic algorithm for face and signature recognition system
Published 2015“…Several approaches and benchmark data were used to validate the effectiveness of the proposed method compared to the unimodal system and normal feature selection method. …”
Get full text
Get full text
Thesis -
7
Multi-perspective usability evaluation with multi-criteria decision analysis for optimal selection of open-source software
Published 2021“…Integration of the best-worst method (BWM) and VIKOR MCDM techniques have been used for weighting and ranking OSS alternatives. …”
Get full text
Get full text
Thesis -
8
Development of an imputation technique - INI for software metric database with incomplete data
Published 2007“…Imputation Error (IE) was use as an evaluation criterion. Imputation Error (IE) was use as an evaluation criterion. …”
Get full text
Get full text
Get full text
Book Section -
9
Graph theory approach for managing lecturers’ schedule using graph colouring method / Siti Nor Ba Basri, Nur Su’aidah Khozaid and Farhana Hazwani Ismail
Published 2023“…Different colours are allocated to each vertex using graph colouring techniques such as the vertices algorithm or the edges algorithm, ensuring that clashing courses and lecturers are assigned different time slots. …”
Get full text
Get full text
Student Project -
10
Variable Neighborhood Descent and Whale Optimization Algorithm for Examination Timetabling Problems at Universiti Malaysia Sarawak
Published 2025“…A constructive algorithm was developed to generate an initial feasible solution, which was subsequently refined using two primary approaches to evaluate their efficiency: Iterative Threshold Pipe Variable Neighborhood Descent (IT-PVND), and a modified Whale Optimization Algorithm (WOA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah
Published 2022“…The algorithm introduces the fuzzy Pareto dominance concept to compare two solutions and uses the scalar decomposition method when one solution cannot dominate the other in terms of the fuzzy dominance level. …”
Get full text
Get full text
Get full text
Thesis -
12
Edge assisted crime prediction and evaluation framework for machine learning algorithms
Published 2022“…In particular, this study proposes a crime prediction and evaluation framework for machine learning algorithms of the network edge. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Development of a new robust hybrid automata algorithm based on surface electromyography (SEMG) signal for instrumented wheelchair control
Published 2020“…Then, experiment result was validated with simulation result using OpenSim biomedical modelling software. …”
Get full text
Get full text
Thesis -
14
Real time self-calibration algorithm of pressure sensor for robotic hand glove system
Published 2019“…This study investigates the use of a novel Proposed Self-Calibration Algorithm (PSCA) of multi pressure sensors in real time on robotic hand glove system. …”
Get full text
Get full text
Thesis -
15
Novel multi-perspective usability evaluation framework for selection of open source software based on BWM and group VIKOR techniques
Published 2021“…Integration of best-worst method (BWM) and VIKOR MCDM techniques has been used for weighting and ranking OSS alternatives. …”
Get full text
Get full text
Article -
16
Estimating Marine CSEM Responses Using Gaussian Process Regression Based on Synthetic Models
Published 2022“…Synthetic multifrequency SBL responses with target depth of 500Â m from the seabed are modelled by finite element (FE) method using computer simulation technology (CST) software. …”
Get full text
Get full text
Article -
17
Computational dynamic support model for social support assignments around stressed individuals among graduate students
Published 2020“…The algorithm complexity analysis was used to measure the execution time in the worst case. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…The results are used to develop the hybrid learning algorithm based on the AdaBoost, Bagging, and RUSBoost methods to predict the damage in the tower based on dynamic frequency domain. …”
Get full text
Get full text
Thesis -
19
Controller placement problem in the optimization of 5G based SDN and NFV architecture
Published 2021“…Extensive computations utilizing MATLAB 2018a on the Intel Core i7/Gen 10 processor and 16 GB of RAM are used to evaluate the algorithm efficacy. According to the blueprint of our heuristic method, the allocation and the optimum number of controllers under an effective decentralized policy could achieve higher efficiency. …”
Get full text
Get full text
Thesis -
20
Ischemic Stroke Detection System With Computer Aided Diagnostic Capability
Published 2017“…Therefore, this project is to develop program for automated emboli detection. MATLAB are used to develop signal processing algorithm of the system. …”
Get full text
Get full text
Monograph
