Search Results - (( _ distribution ((rsa algorithm) OR (tree algorithm)) ) OR ( model evaluation study algorithm ))
Search alternatives:
- model evaluation »
- evaluation study »
- tree algorithm »
- rsa algorithm »
-
1
Interaction effect of process parameters and Pd-electrocatalyst in formic acid electro-oxidation for fuel cell applications: Implementing supervised machine learning algorithms
Published 2023“…Carbon nanotubes; Electrocatalysts; Electrooxidation; Forestry; Formic acid; Gaussian distribution; Learning algorithms; Palladium; Parameter estimation; Regression analysis; Support vector machines; Formic acid electrooxidation; Fuel cell application; Gaussian kernel functions; Gaussian process regression; Interaction effect; Machine learning algorithms; Performance; Process parameters; Regression trees; Support vector machine regressions; Sensitivity analysis…”
Article -
2
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
3
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…We measured the performance of four encryption algorithms (DES, 3DES, AES, and RSA) of our prototype distributed MES system. 256-bit symmetric keys are equivalent in strength to 15380-bit RSA keys. …”
Get full text
Get full text
Get full text
Proceeding Paper -
4
A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem
Published 2016“…The SVGPM performance is compared against current methods in developing a prediction model for IDS. In the third experiment, SVGPM is evaluated on wilt disease data set from remote sensing study, to identify wilt diseased trees in high-resolution image. …”
Get full text
Get full text
Get full text
Thesis -
5
A Stacked Ensemble Deep Learning Approach For Imbalanced Multi-class Water Quality Index Prediction
Published 2024journal::journal article -
6
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
Published 2023“…The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. …”
Article -
7
Improve cloud computing security using RSA encryption with Fermat's little theorem
Published 2014“…Hence we provide a new method for Cloud Computing Security by applying RSA algorithm and Fermat's theorem together. Its help to build a new trusted cloud computing environment. …”
Get full text
Get full text
Get full text
Article -
8
Initial study of electrical capacitance tomography for detecting agarwood
Published 2023“…The ECT system was developed using COMSOL Multiphysics software, modeling 8 electrodes in a 2-dimensional setup. The electrical potential distribution and performance analysis of the ECT model were evaluated for different agarwood locations, shapes, and sizes. …”
Get full text
Get full text
Get full text
Article -
9
-
10
Optimized techniques for landslide detection and characteristics using LiDAR data
Published 2018“…The locations of landslides were detected accurately by employing two Machine learning classifiers, namely, SVM and RF, decision rule and hierarchal rules sets were developed by applying decision tree (DT) algorithm to provide improved landslide inventory. …”
Get full text
Get full text
Get full text
Thesis -
11
Winsorize tree algorithm for handling outliers in classification problem
Published 2016“…This study proposes a modified classification tree algorithm called Winsorize tree based on the distribution of classes in the training dataset. …”
Get full text
Get full text
Get full text
Thesis -
12
Optimum MV Feeder Routing and Substation siting and rating in Distribution Network
Published 2014“…This paper proposes an evolutionary algorithm to determine the optimum distribution substation placement and sizing by using the particle swarm optimization algorithm and optimum feeder routing using modified minimum spanning tree algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
13
Optimized routing algorithm for mobile multicast source in Wireless Mesh Networks
Published 2015“…Simulation results show that the proposed algorithm converges and outperforms a source based tree algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
Practical considerations on Quantum Key Distribution (QKD)
Published 2013“…The advancement of the quantum computing is challenging the foundation of the cryptography by its almost unlimited computation power to predict the secure key that is thought to be absolutely secure based on the currently used algorithms such as the RSA and the Diffie-Hellman and others. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Nano-scale VLSI clock routing module based on useful-skew tree algorithm
Published 2006“…We implemented Useful-Skew Tree (UST) algorithm which is based on the deferred-merge embedding (DME) paradigm, as the clock layout synthesis engine. …”
Get full text
Get full text
Article -
16
E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm
Published 2022“…The model design is Decision Tree (DT) algorithm-based, with an approach to data balancing since the data set used is highly unbalanced and one more approach for feature selection. …”
Get full text
Get full text
Article -
17
Evaluation of MLP-ANN Training Algorithms for Modeling Soil Pore-Water Pressure Responses to Rainfall
Published 2013“…Knowledge of pore-water pressure responses to rainfall is vital in slope failure and slope hydrological studies. The performance of four artificial neural network (ANN) training algorithms was evaluated to identify the training algorithm appropriate for modeling the dynamics of soil pore-water pressure responses to rainfall patterns using multilayer perceptron (MLP) ANN. …”
Get full text
Get full text
Citation Index Journal -
18
Delineating mangrove forest zone using spectral reflectance
Published 2020“…By using geospatial techniques and remotely sensed imagery data, the distribution of mangrove tree species associating with anthropogenic matrix can clearly be identified and mapped. …”
Get full text
Get full text
Thesis -
19
Designing of disparity map based on hierarchical dynamic programming using satellite stereo imagery
Published 2023Conference Paper -
20
Analytical Study Of Machine Learning Models For Stock Trading In Malaysian Market
Published 2024“…Therefore, this study focused to contribute on evaluating different algorithm models such as traditional ML and deep learning models with big stock data of multiple parameters from selected companies in Bursa Malaysia. …”
thesis::master thesis
