Search Results - (( using function method algorithm ) OR ( pre evaluation method algorithm ))

Refine Results
  1. 1

    Fuzzy clustering method and evaluation based on multi criteria decision making technique by Sameer, Fadhaa Othman

    Published 2018
    “…The proposed algorithm is used as a pre-processing method for data followed by Gustafson-Kessel (GK) algorithm to classify credit scoring data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    A soft hierarchical algorithm for the clustering of multiple bioactive chemical compounds by Salim, Naomie, Shah, J. Z.

    Published 2007
    “…Although, fuzzy clustering algorithms such as fuzzy c-means provides an inherent mechanism for the clustering of overlapping structures (objects) but this potential of the fuzzy methods which comes from its fuzzy membership functions have not been utilized effectively. …”
    Get full text
    Get full text
    Get full text
    Book Section
  4. 4

    FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources by Al-Qadhi, Abdulrahman K., Athauda, Rukshan, Latip, Rohaya, Hussin, Masnida

    Published 2026
    “…To initialise function placement, Fitness-Based Swap (FBSW) algorithm is proposed which places functions based on pre-defined information such as function size, function maximum execution time, and storage cost. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems by Shakeel Ahmed, Kamboh

    Published 2014
    “…The designed algorithms are implemented for EHD equations and their performance is evaluated by using different performance indicators. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Application of the Hybrid Artificial Neural Network Coupled with Rolling Mechanism and Grey Model Algorithms for Streamflow Forecasting Over Multiple Time Horizons by Yaseen, Zaher Mundher, Fu, Minglei, Wang, Chen, Mohtar, Wan Hanna Melini Wan, Deo, Ravinesh C., El-Shafie, Ahmed

    Published 2018
    “…In this study, the uncertainty and nonstationary characteristics of streamflow data has been treated using a set of coupled data pre-processing methods before being considered as input for an artificial neural network algorithm namely; rolling mechanism (RM) and grey models (GM). …”
    Get full text
    Get full text
    Article
  8. 8

    Projecting named entity tags from a resource rich language to a resource poor language by Zamin, Norshuhani, Oxley, Alan, Abu Bakar, Zainab

    Published 2012
    “…The method computes the string similarity between the English words and the list of available lexemes in a pre-built lexicon that approximates the best NE mapping.The algorithm has been effectively evaluated using our own terrorism tagged corpus; it achieved satisfactory results in terms of precision, recall, and F-measure.An evaluation of the selected open source NER tool for English is also presented.…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Projecting named entity tags from a resource rich language to a resource poor language by Zamin, N., Oxley, A., Bakar, Z.A.

    Published 2013
    “…The algorithm has been effectively evaluated using our own terrorism tagged corpus; it achieved satisfactory results in terms of precision, recall, and F-measure. …”
    Get full text
    Get full text
    Article
  10. 10

    Projecting named entity tags from a resource rich language to a resource poor language by Zamin, N., Oxley, A., Bakar, Z.A.

    Published 2013
    “…The algorithm has been effectively evaluated using our own terrorism tagged corpus; it achieved satisfactory results in terms of precision, recall, and F-measure. …”
    Get full text
    Get full text
    Article
  11. 11

    Projecting named entity tags from a resource rich language to a resource poor language by Zamin, N., Oxley, A., Bakar, Z.A.

    Published 2013
    “…The algorithm has been effectively evaluated using our own terrorism tagged corpus; it achieved satisfactory results in terms of precision, recall, and F-measure. …”
    Get full text
    Get full text
    Article
  12. 12

    Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems by Nor Sakinah, Abdul Shukor

    Published 2019
    “…Next, when the pre-stated termination condition is fitted, each method is evaluated based on the statistical analysis involving the objective function, the total norm of the error and total norm of the input. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems by Nor Sakinah, Abdul Shukor

    Published 2019
    “…Next, when the pre-stated termination condition is fitted, each method is evaluated based on the statistical analysis involving the objective function, the total norm of the error and total norm of the input. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A study on component-based technology for development of complex bioinformatics software by Ali Shah, Zuraini, Deris, Safaai, Othman, Muhamad Razib, Zakaria, Zalmiyah, Saad, Puteh, Hassan, Rohayanti, Muda, Mohd. Hilmi, Kasim, Shahreen, Roslan, Rosfuzah

    Published 2004
    “…While strength values were used to evaluate the applicability of the whole proposed computational framework to all the different computational PPI prediction methods.…”
    Get full text
    Get full text
    Monograph
  15. 15

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…Finally, the system employs a query formulation via node algorithm (QRYFv) algorithm to improve the selection of structured queries that best match user query Experiments have been conducted to evaluate the performance of the proposed enrichment method, XKQSS and RAXKQSS. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Channel-aware downlink scheduling for quality of service in long term evolution network by Najim, Alaa Omer

    Published 2018
    “…These constraints comprise the use of an inefficient method to determine delay by the buffer size. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Power System State Estimation In Large-Scale Networks by NURSYARIZAL MOHD NOR, NURSYARIZAL

    Published 2010
    “…The Weighted Least Squares (WLS) method is the most popular technique of SE. This thesis provides solutions to enhance the WLS algorithm in order to increase the performance of SE. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Pipeline condition assessment by instantaneous frequency response over hydroinformatics based technique—An experimental and field analysis by Muhammad Hanafi, Yusop, Ghazali, M. F., Mohd Fadhlan, Mohd Yusof, Muhammad Aminuddin, Pi Remli

    Published 2021
    “…The results showed that, although with a low ratio of signal-to-noise, the proposed method could be used as an automatic selector for Intrinsic Mode Function (IMF). …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Uncertainty estimation for improving accuracy of non-rigid registration in cardiac images by Mazaheri, Samaneh, Sulaiman, Puteri Suhaiza, Wirza, Rahmita, Dimon, Mohd Zamrin, Khalid, Fatimah, Tayebi, Rohollah Moosavi

    Published 2015
    “…In other words, uncertainty estimation is used to evaluate the registration algorithm performance which integrates intensity-based and feature-based methods. …”
    Get full text
    Get full text
    Get full text
    Book Section
  20. 20