Search Results - (( _ evaluation ((case algorithm) OR (tree algorithm)) ) OR ( rate simulation based algorithm ))

Refine Results
  1. 1

    Performance evaluation for different intrusion detection system algorithms using machine learning by Zarir, Mustafa Nadhim

    Published 2018
    “…The simulation results showed that the Decision Tree Algorithm achieved the highest precision rate by 95.5% within 42 seconds. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Evaluation of a spacecraft attitude and rate estimation algorithm by Abdullah, Mohammad Nizam Filipski, Varatharajoo, Renuganth

    Published 2010
    “…Purpose: This paper aims to present the development and performance evaluation of an attitude and rate estimation algorithm using an extended Kalman filter structure based on a body‐referenced representation of the state. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Case Slicing Technique for Feature Selection by A. Shiba, Omar A.

    Published 2004
    “…This technique with k = 10 has been used in this thesis to evaluate the proposed approach. CST was compared to other selected classification methods based on feature subset selection such as Induction of Decision Tree Algorithm (ID3), Base Learning Algorithm K-Nearest Nighbour Algorithm (k-NN) and NaYve Bay~sA lgorithm (NB). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Hybrid firefly and particle swarm optimization algorithm for multi-objective optimal power flow with distributed generation by Khan, Abdullah

    Published 2022
    “…The proposed algorithm is simulated for simultaneous OPF-based conflicting objectives, respectively. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Quality of service management algorithms in WiMAX networks by Saidu, Ibrahim

    Published 2015
    “…Simulation have been extensively used to evaluate the proposed algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Efficient flow-based channel assignment schemes for congestion avoidance in wireless mesh networks by Abdulla Mogaibel, Hassen Abd-Almotaleb

    Published 2016
    “…The metric is developed based on the actual channel throughput. Also, two algorithms are developed to address the link sharing problem during the channel assignment stages; channel-to-interface and link-to-interface stages. …”
    Get full text
    Get full text
    Thesis
  7. 7

    An efficient backoff algorithm for IEEE 802.15.4 wireless sensor networks by Dahham, Zahraa, Sali, Aduwati, Mohd Ali, Borhanuddin

    Published 2014
    “…A long random backoff time causes longer average delay, while a small one gives a high collision rate. In this paper, we propose an efficient backoff algorithm, called EBA-15.4MAC that enhances the performance of slotted CSMA/CA algorithm. …”
    Get full text
    Get full text
    Article
  8. 8

    Multi-user beamforming, fairness and device-to-device channel state information sharing in downlink non-orthogonal multiple access systems by Abdulhussein, Mohanad Mohammed

    Published 2021
    “…In the second part, two user clustering algorithms are proposed. These algorithms are alternatives to the PF-SUS-SIR and can achieve better throughput-fairness trade-off in case of perfect CSIT and limited feedback. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Application of the Whale Optimization Algorithm (WOA) in Reservoir Optimization Operation Under Investigation of Climate Change Impact: A Case Study at Klang Gate Dam, Malaysia by Lai V., Huang Y.F., Koo C.H., Ahmed A.N., El-Shafie A.

    Published 2024
    “…During the optimization phase, the average storage failure rate for all the RCPs was 34.93%, while during the simulation phase, the average storage failure rate was 97.29%. …”
    Conference Paper
  10. 10

    Slight-Delay Shaped Variable Bit Rate (SD-SVBR) Technique for Video Transmission by Ahmad Suki, Che Mohamed Arif

    Published 2011
    “…It is designed based on the Shaped VBR (SVBR) algorithm and was implemented in the Network Simulator 2 (ns-2). …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Block based low complexity iterative QR precoder structure for Massive MIMO by Mok, Li Suet

    Published 2021
    “…The simulation of quasi-static is used. We generate the model and evaluate the performance in MATLAB. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh by Hazem Jihad , Ali Badarneh

    Published 2021
    “…The second evaluation divides into three scenarios. The first one evaluates Coalition-Based Index-Tree framework independently, without any effect from Dynamic-Coalition framework and Static-Coalition algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Evaluating A New Adaptive Group Lasso Imputation Technique For Handling Missing Values In Compositional Data by Tian, Ying

    Published 2024
    “…Considering the impact of outliers on the accuracy of estimation, both simulation and case analysis are conducted to compare the proposed algorithm against four existing methods. …”
    Get full text
    Get full text
    Thesis
  14. 14

    An optimized variant of machine learning algorithm for datadriven electrical energy efficiency management (D2EEM) by Shamim, Akhtar

    Published 2024
    “…This study recommends a selection trade-off as the function of prediction efficiency and efficacy of the algorithm. Particularly, the proposed optimized Bagged Trees are the most effective algorithm for energy demand prediction applications, and the proposed optimized Medium Trees are the most efficient algorithm for real-time systems. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Enhancing a cluster-based TDMA MAC protocol for vehicle-to-vehicle communications / Abubakar Bello Tambawal by Abubakar Bello , Tambawal

    Published 2020
    “…A dynamic time slot allocation strategy using a binary tree algorithm has been proposed to prevent vehicles from the adjacent clusters to reserve the same time slot. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Machine learning in predicting anti-money laundering compliance with protection motivation theory among professional accountants by Masrom, S., Tarmizi, M.A., Halid, S., Rahman, R.A., Abd Rahman, A.S., Ibrahim, R.

    Published 2023
    “…The research elaborates on the design and implementation of machine learning models based on three algorithms: Decision Tree, Gradient Boosted Tree, and Support Vector Machine. …”
    Get full text
    Get full text
    Article
  17. 17

    Optimum MV Feeder Routing and Substation siting and rating in Distribution Network by Hasan, Ihsan Jabbar, Ab Ghani, Mohd Ruddin, Gan, Chin Kim

    Published 2014
    “…The proposed algorithm evaluates on the distribution network case with 164 load blocks. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Fuzzy adaptive emperor penguin optimizer for global optimization problems by Md Abdul, Kader

    Published 2023
    “…The Emperor Penguin Optimizer (EPO) is a recently developed population-based metaheuristic algorithm that simulates the huddling behaviour of emperor penguins. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Optimal Weighted Learning of PCA and PLS for Multicollinearity Discriminators and Imbalanced Groups in Big Data (S/O: 13224) by Mahat, Nor Idayu, Engku Abu Bakar, Engku Muhammad Nazri, Zakaria, Ammar, Mohd Nazir, Mohd Amril Nurman, Misiran, Masnita

    “…Next, the weighted and transformed features were used to train Linear Discriminant Function (LDA) and to evaluate the constructed rule. The designed algorithm was structured in k-fold cross-validation in attempt to minimise the biasness of the classification performance, measured using error rate. …”
    Get full text
    Get full text
    Monograph
  20. 20

    Non-Parametric and Parametric Estimations of Cure Fraction Using Right-and Interval-Censored Data by Aljawdi, Bader

    Published 2011
    “…In this thesis, we considered two methods via the expectation maximization (EM) algorithm for cure rate estimation based on the BCH model using the two censoring types common to cancer clinical trials; namely, right and interval censoring. …”
    Get full text
    Get full text
    Thesis