Search Results - (( ((re evaluation) OR (_ evaluation)) tree algorithm ) OR ( using simulation based algorithm ))

Refine Results
  1. 1

    Performance evaluation for different intrusion detection system algorithms using machine learning by Zarir, Mustafa Nadhim

    Published 2018
    “…The algorithms considered are the Naive Bays Algorithm, Decision Tree Algorithm and Hybrid Algorithm for different datasets. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Detection and classification of conflict flows in SDN using machine learning algorithms by Mutaz Hamed Hussien Khairi, Sharifah Hafizah Syed Ariffin, Nurul Mu'azzah Abdul Latiff, Kamaludin Mohamad Yusof, Mohamed Khalafalla Hassan, Fahad Taha Al-Dhief, Mosab Hamda, Suleman Khan, Muzaffar Hamzah

    Published 2021
    “…Using a range flows from 1000 to 100000 with an increment of 10000 flows per step in two network topologies namely, Fat Tree and Simple Tree Topologies, that were created using the Mininet simulator and connected to the Ryu controller, the performance of the proposed algorithms was evaluated for efficiency and effectiveness across a variety of evaluation metrics. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm by Ibrahim, Hamidah, Yasin, Waheed, Abdul Hamid, Nor Asilah Wati, Udzir, Nur Izura

    Published 2014
    “…In this work, new intelligent cooperative web caching approaches based on decision tree supervised machine learning algorithm are presented. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A conceptual framework for multi-objective optimization of building performance: Integrating intelligent algorithms, simulation tools, and climate adaptation by Rong, Li, Shari, Zalina, Ab Kadir, Mohd Zainal Abidin

    Published 2025
    “…A thematic analysis of 40 peer-reviewed articles was conducted using ATLAS.ti, revealing three dominant research themes: intelligent algorithms, building performance simulation techniques, and adaptive design for climate change. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    A novel peak shaving algorithm for islanded microgrid using battery energy storage system by Uddin, Moslem, Romlie, M.F., Abdullah, M.F., Tan, Chia Kwang, Shafiullah, G.M., Bakar, Ab Halim Abu

    Published 2020
    “…The objective of this study is to propose a decision-tree-based peak shaving algorithm for islanded microgrid. …”
    Get full text
    Get full text
    Article
  8. 8

    A novel peak shaving algorithm for islanded microgrid using battery energy storage system by Uddin, M., Romlie, M.F., Abdullah, M.F., Tan, C., Shafiullah, G.M., Bakar, A.H.A.

    Published 2020
    “…The objective of this study is to propose a decision-tree-based peak shaving algorithm for islanded microgrid. …”
    Get full text
    Get full text
    Article
  9. 9

    Developing A Prediction Tool To Improve The Shading Efficiency Of The Pedestrian Zones by Khudhayer, Wael A.

    Published 2020
    “…The development of the prediction tool was conducted base on integrating three sequenced algorithms, which are sun position algorithm, shadow length and position algorithm, and expansion limit algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    A proactive energy awareness traffic routing for wireless sensor networks against energy sink-holes by Mustafa, Mayada Salih Abdalla

    Published 2019
    “…OMNeT++ simulator has been used to conduct performance evaluations of the above algorithms. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A cluster-based hybrid replica control protocol for high availability in data grid by Mabni, Zulaile

    Published 2019
    “…The performance of CBH protocol is evaluated theoretically and using simulations. A discrete event simulator called GridSim and Java programming language is used to simulate the proposed protocol. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Intelligent cooperative web caching policies for media objects based on J48 decision tree and Naive bayes supervised machine learning algorithms in structured peer-to-peer systems by Ibrahim, Hamidah, Yasin, Waheed, Udzir, Nur Izura, Abdul Hamid, Nor Asilah Wati

    Published 2016
    “…In this work, intelligent cooperative web caching approaches based on J48 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Context-Aware Recommender System based on machine learning in tourist mobile application / Nor Liza Saad … [et al.] by Saad, Nor Liza, Khairudin, Nurkhairizan, Azizan, Azilawati, Abd Rahman, Abdullah Sani, Ibrahim, Roslina

    Published 2022
    “…Furthermore, data were collected simulated based on the mobile application prototype to be used for finding the suitable machine learning algorithms in the recommendation system module. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Enhancing a cluster-based TDMA MAC protocol for vehicle-to-vehicle communications / Abubakar Bello Tambawal by Abubakar Bello , Tambawal

    Published 2020
    “…The proposed EC-TMAC protocol was evaluated through simulation and validated using a statistical analysis tool. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Enhanced dynamic security assessment for power system under normal and fake tripping contingencies. by A. Salih, Qusay

    Published 2019
    “…The hybrid logistic model tree (hybrid LMT) approach proposed in this study combines the symmetrical uncertainties (SU) algorithm and the logistic model tree (LMT) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Adaptive RS-group scheduling for WiMAX multihop relay by Saeed, Rashid Abdelhaleem, Al-Talib , S.A., Al-Ahdal, T.A., Mohamad, H., Abbas, Majed, Ali, Bashir, Odeh, M.

    Published 2010
    “…The proposed model is evaluated using NS-2 network simulation. The simulation result shows that the proposed scheduling achieves higher throughput performance compared to IEEE 802.16j tree-topology.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Network bandwidth utilization based on collaborative web caching using machine learning algorithms in peer-to-peer systems for media web objects by Mohammed, Waheed Yasin

    Published 2018
    “…In this work, intelligent collaborative web caching approaches based on C4.5 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. …”
    Get full text
    Get full text
    Thesis
  20. 20

    An Improved C4.5 Data Mining Driven Algorithm for the Diagnosis of Coronary Artery Disease by Haruna, A.A., Muhammad, L.J., Yahaya, B.Z., Garba, E.J., Oye, N.D., Jung, L.T.

    Published 2019
    “…This research used an im-proved C4.5 data mining algorithm for the diagnosis of CAD. A performance evaluation of the improved algorithm was carried out against the traditional C4.5 Algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item