Search Results - (( using function based algorithm ) OR ( data evaluation method algorithm ))
Search alternatives:
- evaluation method »
- method algorithm »
- data evaluation »
- using function »
-
1
Fuzzy clustering method and evaluation based on multi criteria decision making technique
Published 2018“…The proposed algorithm is used as a pre-processing method for data followed by Gustafson-Kessel (GK) algorithm to classify credit scoring data. …”
Get full text
Get full text
Get full text
Thesis -
2
Tree-based contrast subspace mining method
Published 2020“…The research works involve first preparing the real world numerical and categorical data sets. Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
Get full text
Get full text
Get full text
Thesis -
3
Hybrid subjective evaluation method using weighted subsethood - based (WSBA) rule generation algorithm
Published 2013“…The use of fuzzy rules, which were extracted directly from input data through Weighted Subsethood-based (WSBA) Rule Generation Algorithm.WSBA rule generation use the subsethood values to generate the weights which finally produced the fuzzy general rules.The rules generated through the data provided knowledge in developed fuzzy rule The fuzzy rules embedded in the framework of subjective evaluation method showed advantages in generalizing the evaluation of the performance achievement, where the evaluation process can be conducted consistently in producing good evaluation results with the use of the membership set score.The results from the numerical examples are comparable to other fuzzy evaluation methods, even with the use of small rule size.…”
Get full text
Get full text
Get full text
Article -
4
Improved stochastic gradient descent algorithm with mean-gradient adaptive stepsize for solving large-scale optimization problems
Published 2023“…It is an iterative algorithm with descent properties that reduces computational cost by using derivatives of random data points. …”
Get full text
Get full text
Get full text
Article -
5
Data depublication using : Hashing algorithm / Naimah Nayan
Published 2019“…The objective of this project is to compare MD5 & SHA-1 algorithm in data deduplication technique and to evaluate the MD5 & SHA-1 algorithm, length of message digest and speed using deduplication software. …”
Get full text
Get full text
Thesis -
6
Efficient genetic partitioning-around-medoid algorithm for clustering
Published 2019“…The rest sets of experiments carried out to evaluate the proposed algorithms. Precisely, the second set revealed that the proposed genetic medoid based algorithms with both DB and VRC fitness functions produced more accurate results compared with the genetic means based algorithms in terms of the Fscore. …”
Get full text
Get full text
Thesis -
7
Hybrid subjective evaluation of rule Exraction Algorithm using Weighted Subsethood-Based (WSBA)
Published 2013“…Fuzzy rules are important elements that being highlighted in any fuzzy expert system.This research proposes the framework of subjective performance evaluation using fuzzy technique for ranking the performance of the financial performance of a company under a multi criteria environment.There are a lot of techniques used such as fuzzy similarity function, fuzzy synthetic decision and satisfaction function have been adopted.The framework is based on fuzzy multi-criteria decision-making that consists of fuzzy rules.The use of fuzzy rules, which were extracted directly from input data through Weighted Subsethood-based (WSBA) Rule Generation Algorithm.WSBA rule generation use the subsethood values to generate the weights which finally produced the fuzzy general rules.The rules generated through the data provided knowledge in developed fuzzy rule The fuzzy rules embedded in the framework of subjective evaluation method showed advantages in generalizing the evaluation of the performance achievement, where the evaluation process can be conducted consistently in producing good evaluation results with the use of the membership set score.The results from the numerical examples are comparable to other fuzzy evaluation methods, even with the use of small rule size.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Evaluation of lightning return stroke current using measured electromagnetic fields
Published 2012“…Moreover, in the proposed method, the attenuation height dependent factor can be determined using measured field while assuming it to be an unknown function based on the engineering model. …”
Get full text
Get full text
Thesis -
9
Modeling time series data using Genetic Algorithm based on Backpropagation Neural network
Published 2018“…This study showed the task of optimizing the topology structure and the parameter values (e.g., weights) used in the BPNN learning algorithm by using the GA. …”
Get full text
Get full text
Thesis -
10
Data-driven PID controller of wind turbine systems using safe experimentation dynamics algorithm
Published 2024“…Simulation analyses, encompassing convergence curves of the fitness function, time response specification analysis of step response, stability analysis using Bode plots, and computational effort analysis based on NFE, evaluate the effectiveness of the proposed SEDA-based PID controller for wind turbine systems Furthermore, the study reveals that the settling time (Ts) and percentage of overshoot (Mp) are notably low, measuring 1.27E-4s and 0%, respectively, compared to other algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Total 1600 different type of files were used for evaluation of the proposed algorithm, results show that 87% of injected objects were correctly detected…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…Identification studies using NARX (Nonlinear AutoRegressive with eXogenous input) models employing simulated systems and real plant data are used to demonstrate that the algorithm is able to detect significant variables and terms faster and to select a simpler model structure than other well-known EC methods.…”
Get full text
Get full text
Get full text
Article -
13
Iterative And Single-Step Solutions Of Two Dimensional Time-Domain Inverse Scattering Problem Featuring Ultra Wide Band Sensors
Published 2010“…Finally, the algorithms‘ robustness against the noisy data was evaluated using two simulated experiments with signal-to-noise ratios of 6 and 8 dB respectively.…”
Get full text
Get full text
Thesis -
14
Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms
Published 2020“…In the sizing of the SAPV system, the mutation adaptive DE (MADE) algorithm based multi-objective functions minimizes three constraint objective functions. …”
Get full text
Get full text
Thesis -
15
Pashto language stemming algorithm
Published 2015“…Furthermore, the accuracy and strength of the proposed algorithm is evaluated using word count method. To validate the function of the developed algorithm, two native speakers of Pashto were recruited to evaluate the algorithm in terms of its accuracy and strength. …”
Get full text
Get full text
Get full text
Article -
16
Performance Analysis of ARMA based Magnetic Resonance Imaging (MRI) Reconstruction Algorithm
Published 2012“…The proposed model coefficients determination in conjunction with various methods of optimal model order determination were then applied on MRI data using both Transient Error Reconstruction Algorithm (TERA) and modified Transient Error Reconstruction Algorithm to obtain images with improved resolution. …”
Get full text
Get full text
Monograph -
17
Data-driven continuous-time Hammerstein modeling with missing data using improved Archimedes optimization algorithm
Published 2024“…Models were tested with both complete and missing output data to evaluate the robustness of the IAOA-based method. …”
Get full text
Get full text
Get full text
Article -
18
Improved cuckoo search based neural network learning algorithms for data classification
Published 2014“…On the other hand, LM algorithms which are derivative based algorithms still face a risk of getting stuck in local minima. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Field data-based mathematical modeling by Bode equations and vector fitting algorithm for renewable energy applications
Published 2018“…The most powerful features of this method is the ability to model irregular or randomly shaped data and to be applied to any algorithms that estimating models using frequency-domain data to provide state-space or transfer function for the model.…”
Get full text
Get full text
Get full text
Article -
20
Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems
Published 2014“…The designed algorithms are implemented for EHD equations and their performance is evaluated by using different performance indicators. …”
Get full text
Get full text
Thesis
