Search Results - (( using function a algorithm ) OR ( basic evaluation tool algorithm ))
Search alternatives:
- basic evaluation »
- evaluation tool »
- using function »
- tool algorithm »
- a algorithm »
- function a »
-
1
Medical diagnosis using data mining techniques / Shaiful Nizam Zamri
Published 2003“…Then followed by the methodology part as the scenario of the project and the system analysis, which will review the need requirements and tools used to implement the system. The system design part will explains the flow and functionality of the system structure. …”
Get full text
Get full text
Thesis -
2
Automatic generic process migration system in linux
Published 2012“…A migration algorithm is designed which attempts to exploit the unique features of the basic migration algorithms to form a generic algorithm. …”
Get full text
Get full text
Thesis -
3
-
4
Augmented reality monitoring system for cross-belt conveyor in advanced automation line / Sukarnur Che Abdullah ... [et al.]
Published 2025“…The algorithm's efficacy was validated through its application to a basic material handling process, specifically a barcode sorting conveyor. …”
Get full text
Get full text
Get full text
Article -
5
FEATURES EXTRACTION OF HEP-2 IMMUNOFLUORESCENCE PATTERNS BASED ON TEXTURE AND REGION OF INTEREST TECHNIQUES
Published 2013“…This will later on cause autoantibody disease such as SLE where internal organ failed to perform their basic functions. Antinuclear antibody (ANA) test is a way to test the presence of autoantibodies in individual blood serum. …”
Get full text
Get full text
Final Year Project -
6
Agent-based extraction algorithm for computational problem solving
Published 2015“…The tool is used to evaluate the accuracy of the proposed extraction algorithm to extract the appropriate information which are needed. …”
Get full text
Get full text
Thesis -
7
Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming
Published 2019“…In point of fact, it is significant to produce a security evaluation of block cipher algorithms to determine a statistical non-random behavior of attacks. …”
Get full text
Get full text
Get full text
Article -
8
Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension
Published 2015“…This model is then to be used in the prototype tool development that is called 3De-ALPROV (Design Development Debug – Algorithm Program Visualization). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Form Finding And Shape Change Analysis Of Spine Inspired Bio-Tensegrity Model
Published 2017“…Numerical simulations of the regular tensegrity and SBS models have proven the superior convergent characteristic of the proposed algorithm for shape change analysis. The results reveal that the proposed approach for shape change analysis has a very strong ability for a self-equilibrated model to search their desired target coordinates in multi-directional modes through optimization of the forced elongation in cables. …”
Get full text
Get full text
Thesis -
10
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…Based on this designed text algorithm, a prototype in Visual Basic is developed. …”
Get full text
Get full text
Research Reports -
11
A comparison study of classifier algorithms for mobile-phone’s accelerometer based activity recognition
Published 2012“…As a continuation of the research towards the search for a suitable and reliable algorithm for real-time activity recognition using mobile phone, an evaluation and comparison study of the performance of seven different categories of classifier algorithms in classifying user activities were conducted. …”
Get full text
Get full text
Get full text
Article -
12
Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions
Published 2018“…The second technique is to solve bi-objective functions by using the BOBAT algorithm. The third technique is an integration of BOGSA with BOBAT to produce a BOGSBAT algorithm. …”
Get full text
Get full text
Thesis -
13
Computerized simulation system for ECM radar system
Published 2007“…The principle of electromagnetic spectrum is the basic background for all calculation and simulation. …”
Get full text
Get full text
Get full text
Thesis -
14
Syllable-based Malay Word Stemmer
Published 2014“…Word stemmer is one of the basic and crucial text processing tools in any languages. …”
Get full text
Get full text
Proceeding -
15
A block cipher based on genetic algorithm
Published 2016“…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
Get full text
Get full text
Get full text
Thesis -
16
FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources
Published 2026“…We have evaluated the FaaSBid model and the proposed algorithms and pricing model by comparing with a number of existing models and algorithms using real-world datasets. …”
Get full text
Get full text
Get full text
Article -
17
Assessing the potential of laboratory instructional tool through Synthesia AI: a case study on student learning outcome / Jacqueline Joseph
Published 2023“…This research study aims to investigate the effectiveness of utilizing Synthesia Artificial Intelligence (AI), an advanced instructional tool, in enhancing laboratory experiments. The research focused on evaluating the impact of incorporating Synthesia AI as a supplementary learning resource on student learning outcomes in laboratory settings. …”
Get full text
Get full text
Get full text
Article -
18
Single Fitness Function to Optimize Energy using Genetic Algorithms for Wireless Sensor Network
Published 2024journal::journal article -
19
Computing the autopilot control algorithm using predictive functional control for unstable model
Published 2009“…This paper discusses the computing development of a control algorithm using Predictive Functional Control (PFC) for model-based that having one or more unstable poles. …”
Get full text
Get full text
Conference or Workshop Item -
20
A review on monocular tracking and mapping: from model-based to data-driven methods
Published 2022“…Finally, the popular benchmarks available for developing and evaluating these algorithms are presented along with a comparative study on a different class of algorithms. …”
Get full text
Get full text
Article
