Search Results - (( using function method algorithm ) OR ( pre evaluation method algorithm ))
Search alternatives:
- evaluation method »
- method algorithm »
- function method »
- using function »
- pre evaluation »
-
1
Fuzzy clustering method and evaluation based on multi criteria decision making technique
Published 2018“…The proposed algorithm is used as a pre-processing method for data followed by Gustafson-Kessel (GK) algorithm to classify credit scoring data. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
A soft hierarchical algorithm for the clustering of multiple bioactive chemical compounds
Published 2007“…Although, fuzzy clustering algorithms such as fuzzy c-means provides an inherent mechanism for the clustering of overlapping structures (objects) but this potential of the fuzzy methods which comes from its fuzzy membership functions have not been utilized effectively. …”
Get full text
Get full text
Get full text
Book Section -
4
FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources
Published 2026“…To initialise function placement, Fitness-Based Swap (FBSW) algorithm is proposed which places functions based on pre-defined information such as function size, function maximum execution time, and storage cost. …”
Get full text
Get full text
Get full text
Article -
5
Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems
Published 2014“…The designed algorithms are implemented for EHD equations and their performance is evaluated by using different performance indicators. …”
Get full text
Get full text
Thesis -
6
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…To evaluate the algorithm, we conducted two experiments. …”
Get full text
Get full text
Thesis -
7
Application of the Hybrid Artificial Neural Network Coupled with Rolling Mechanism and Grey Model Algorithms for Streamflow Forecasting Over Multiple Time Horizons
Published 2018“…In this study, the uncertainty and nonstationary characteristics of streamflow data has been treated using a set of coupled data pre-processing methods before being considered as input for an artificial neural network algorithm namely; rolling mechanism (RM) and grey models (GM). …”
Get full text
Get full text
Article -
8
Projecting named entity tags from a resource rich language to a resource poor language
Published 2012“…The method computes the string similarity between the English words and the list of available lexemes in a pre-built lexicon that approximates the best NE mapping.The algorithm has been effectively evaluated using our own terrorism tagged corpus; it achieved satisfactory results in terms of precision, recall, and F-measure.An evaluation of the selected open source NER tool for English is also presented.…”
Get full text
Get full text
Get full text
Article -
9
Projecting named entity tags from a resource rich language to a resource poor language
Published 2013“…The algorithm has been effectively evaluated using our own terrorism tagged corpus; it achieved satisfactory results in terms of precision, recall, and F-measure. …”
Get full text
Get full text
Article -
10
Projecting named entity tags from a resource rich language to a resource poor language
Published 2013“…The algorithm has been effectively evaluated using our own terrorism tagged corpus; it achieved satisfactory results in terms of precision, recall, and F-measure. …”
Get full text
Get full text
Article -
11
Projecting named entity tags from a resource rich language to a resource poor language
Published 2013“…The algorithm has been effectively evaluated using our own terrorism tagged corpus; it achieved satisfactory results in terms of precision, recall, and F-measure. …”
Get full text
Get full text
Article -
12
Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems
Published 2019“…Next, when the pre-stated termination condition is fitted, each method is evaluated based on the statistical analysis involving the objective function, the total norm of the error and total norm of the input. …”
Get full text
Get full text
Thesis -
13
Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems
Published 2019“…Next, when the pre-stated termination condition is fitted, each method is evaluated based on the statistical analysis involving the objective function, the total norm of the error and total norm of the input. …”
Get full text
Get full text
Thesis -
14
A study on component-based technology for development of complex bioinformatics software
Published 2004“…While strength values were used to evaluate the applicability of the whole proposed computational framework to all the different computational PPI prediction methods.…”
Get full text
Get full text
Monograph -
15
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Finally, the system employs a query formulation via node algorithm (QRYFv) algorithm to improve the selection of structured queries that best match user query Experiments have been conducted to evaluate the performance of the proposed enrichment method, XKQSS and RAXKQSS. …”
Get full text
Get full text
Get full text
Thesis -
16
Channel-aware downlink scheduling for quality of service in long term evolution network
Published 2018“…These constraints comprise the use of an inefficient method to determine delay by the buffer size. …”
Get full text
Get full text
Get full text
Thesis -
17
Power System State Estimation In Large-Scale Networks
Published 2010“…The Weighted Least Squares (WLS) method is the most popular technique of SE. This thesis provides solutions to enhance the WLS algorithm in order to increase the performance of SE. …”
Get full text
Get full text
Thesis -
18
Pipeline condition assessment by instantaneous frequency response over hydroinformatics based technique—An experimental and field analysis
Published 2021“…The results showed that, although with a low ratio of signal-to-noise, the proposed method could be used as an automatic selector for Intrinsic Mode Function (IMF). …”
Get full text
Get full text
Get full text
Article -
19
Uncertainty estimation for improving accuracy of non-rigid registration in cardiac images
Published 2015“…In other words, uncertainty estimation is used to evaluate the registration algorithm performance which integrates intensity-based and feature-based methods. …”
Get full text
Get full text
Get full text
Book Section -
20
Identifying and detecting unlawful behavior in video images using genetic algorithm / Shahirah Mohamed Hatim
Published 2016“…GA is used as the method of unlawful behavior detection. …”
Get full text
Get full text
Thesis
