Search Results - (( based evaluation _ algorithm ) OR ( user identification ((svm algorithm) OR (bat algorithm)) ))
Search alternatives:
- user identification »
- based evaluation »
- svm algorithm »
- bat algorithm »
-
1
-
2
An improved framework for content and link-based web spam detection: a combined approach
Published 2021“…The link-based web spam detection framework initially exposed the relationship network behind the link spamming and then used the paid-links database algorithm, spam signals algorithm, and improved link farms algorithm for link-based web spam identification. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Development of interactive application for classification of Artocarpus Species
Published 2020“…The combination of Prewitt algorithm, Canny alogorithm, Gray-Level co-occurrence matrix will be used in SVM. …”
Get full text
Undergraduate Final Project Report -
4
-
5
Rapid lard identification with portable electronic nose
Published 2017“…A portable reliable device with an ability to identify lard rapidly can be convenient to users concerned about lard adulteration. The prototype was examined using K-Nearest Neighbors algorithm (KNN), Support Vector Machine (SVM), Bagged Trees and Simple Tree, and can identify lard with the highest accuracy of 95.6% among three types of fat (lard, chicken and beef) in liquid form over a certain range of temperature using KNN.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Rapid lard identification with portable electronic nose
Published 2017“…A portable reliable device with an ability to identify lard rapidly can be convenient to users concerned about lard adulteration. The prototype was examined using K-Nearest Neighbors algorithm (KNN), Support Vector Machine (SVM), Bagged Trees and Simple Tree, and can identify lard with the highest accuracy of 95.6 among three types of fat (lard, chicken and beef) in liquid form over a certain range of temperature using KNN. © Published under licence by IOP Publishing Ltd.…”
Get full text
Get full text
Article -
7
-
8
GA-based feature subset selection in a spam/non-spam detection system
Published 2012“…Spam has created a significant security problem for computer users everywhere. Spammers take an advantage of defrauds to cover parts of messages that can be used for identification of spam. …”
Get full text
Get full text
Conference or Workshop Item -
9
Sudoku Generator based on hybrid algorithm / Faridah Abdul Rahman
Published 2012“…After testing and evaluation the prototype, the result shows that the Sudoku generator based on hybrid algorithm takes more times on solving the Sudoku. …”
Get full text
Get full text
Thesis -
10
Performance Evaluation of Vector Evaluated Gravitational Search Algorithms Based on ZDT Test Functions
Published 2014“…This paper presents a performance evaluation of Vector Evaluated Gravitational Search Algorithm (VEGSA), namely VEGSA-I and VEGSA-II algorithms, for multi-objective optimization problems. …”
Get full text
Get full text
Get full text
Article -
11
Standardizing and weighting the evaluation criteria of many-objective optimization competition algorithms based on fuzzy delphi and fuzzy-weighted zero-inconsistency methods
Published 2021“…The evaluation criteria of Many Objective Optimization algorithm (MaOO) play a critical role in evaluating the competition MaOO algorithms. …”
Get full text
Get full text
Thesis -
12
Efficient genetic partitioning-around-medoid algorithm for clustering
Published 2019“…However, the complexity of the kmedoid based algorithms in general is more than the complexity of the k-means based algorithms. …”
Get full text
Get full text
Thesis -
13
Evaluation of Vector Evaluated Particle Swarm Optimisation Enhanced with Non-dominated Solutions and Multiple Nondominated Leaders based on WFG Test Functions
Published 2014“…The improved VEPSO algorithms have been subjected to a series of numerical experiments based on ZDT benchmark datasets. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Optimizing large scale combinatorial problems using multiple ant colonies algorithm based on pheromone evaluation technique
Published 2008“…The new algorithm is based on the ant colony system and utilizes average and maximum pheromone evaluation mechanisms. …”
Get full text
Get full text
Get full text
Article -
15
Objective and Subjective Evaluations of Adaptive Noise Cancellation Systems with Selectable Algorithms for Speech Intelligibility
Published 2018“…Adaptive Noise Cancellation (ANC) systems with selectable algorithms refer to ANC systems that are able to change the adaptation algorithm based on the eigenvalue spread of the noise. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Efficient signaling schedule for centralized and distributed scheduling algorithms for wimax multi-hop relay networks
Published 2012“…On the other hand, the proposed distributed scheduling algorithm (MR-DSA) was evaluated by comparing its performance against performances of Greedy and the factor-graph-based low-complexity distributed scheduling algorithm (FGDS) algorithms in terms of delay, throughput, and overhead. …”
Get full text
Get full text
Thesis -
17
Deadline based performance evaluation of job scheduling algorithms
Published 2012Get full text
Citation Index Journal -
18
Development of high quality speech compression system for Quranic recitation based on modified CELP algorithm
Published 2013“…Lastly, we evaluate the performance of the developed algorithm objectively using PESQ (Perceptual Evaluation of Speech Quality). …”
Get full text
Get full text
Get full text
Proceeding Paper -
19
An adaptive routing algorithm: enhanced confidence-based Q routing algorithm in network traffic
Published 2004“…Confidence-based Q (CQ) Routing Algorithm is an adaptive network routing algorithm. …”
Get full text
Get full text
Get full text
Article -
20
Evaluation of Visual Network Algorithms on Historical Documents
Published 2020“…The evaluation found that FA2 algorithm when combined with MC algorithm produce the best network representation for SAGA. …”
Get full text
Get full text
Get full text
Thesis
