Search Results - (( based evaluation a algorithm ) OR ( _ identification ((rsa algorithm) OR (tree algorithm)) ))
Search alternatives:
- based evaluation »
- _ identification »
- tree algorithm »
- rsa algorithm »
- evaluation a »
- a algorithm »
-
1
Tree-based contrast subspace mining method
Published 2020“…The research works involve first preparing the real world numerical and categorical data sets. Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
Get full text
Get full text
Get full text
Thesis -
2
Detection and classification of conflict flows in SDN using machine learning algorithms
Published 2021“…Using a range flows from 1000 to 100000 with an increment of 10000 flows per step in two network topologies namely, Fat Tree and Simple Tree Topologies, that were created using the Mininet simulator and connected to the Ryu controller, the performance of the proposed algorithms was evaluated for efficiency and effectiveness across a variety of evaluation metrics. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
3
Object-based imagery analysis for automatic urban tree species detection using high resolution satellite image
Published 2016“…This study also explores the use and comparison of object-based classification, and two common pixel-based classification methods namely, maximum likelihood and support vector machines based on WorldView-2 satellite imagery to evaluate the potential of the object-based in compare to pixel-based to detect urban tree species. …”
Get full text
Get full text
Thesis -
4
Complex word identification model for lexical simplification in the Malay language for non-native speakers
Published 2023“…This study consists of three modules, i) A Malay CWI dataset, ii) Malay CWI features with the new enhanced stemmer rules, and iii) A CWI model based on the Gradient Boosted Tree (GB) algorithm. …”
Get full text
Get full text
Get full text
Thesis -
5
Multi-sensor fusion based on multiple classifier systems for human activity identification
Published 2019“…To provide compact feature vector representation, we studied hybrid bio-inspired evolutionary search algorithm and correlation-based feature selection method and evaluate their impact on extracted feature vectors from individual sensor modality. …”
Get full text
Get full text
Article -
6
Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman
Published 2022“…Plus, to analyse the efficiency of a detection model on keylogger dataset by evaluating a selection of attributes. …”
Get full text
Get full text
Student Project -
7
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…After evaluating the results of these algorithms, a hybrid Artificial Neural Network-based Imperial Competitive Algorithm (ANN-ICA) was presented in the deployment step of the proposed methodology to identify the structural damage of illustrative structures. …”
Get full text
Get full text
Get full text
Thesis -
8
A comprehensive review of crop yield prediction using machine learning approaches with special emphasis on palm oil yield prediction
Published 2021“…Finally, a prospective architecture of machine learning-based palm oil yield prediction has been proposed based on the critical evaluation of existing related studies. …”
Get full text
Get full text
Get full text
Article -
9
Correlation analysis and predictive performance based on KNN and decision tree with augmented reality for nuclear primary cooling process / Ahmad Azhari Mohamad Nor
Published 2024“…Subsequently, predictive models employing k-nearest neighbour and decision tree algorithms are constructed and evaluated based on accuracy, precision, and recall metrics. …”
Get full text
Get full text
Thesis -
10
Landslide susceptibility mapping: machine and ensemble learning based on remote sensing big data
Published 2020“…The dataset used to train and test all the algorithms consists of a landslide inventory map of 227 landslide locations. …”
Get full text
Get full text
Get full text
Article -
11
An improved framework for content and link-based web spam detection: a combined approach
Published 2021“…The link-based web spam detection framework initially exposed the relationship network behind the link spamming and then used the paid-links database algorithm, spam signals algorithm, and improved link farms algorithm for link-based web spam identification. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
RSA authentication mechanisms in control grid computing environment using Gridsim toolkit
Published 2015“…In order to satisfy the security need of grid computing environment, we design an alternative authentication mechanism using RSA algorithm to ensure the user identification, and carry out the experiment in the Gridsim toolkit simulator.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Human odour detection approach using machine learning
Published 2019“…The unsurpassed framework for learning algorithm to be used for human identification is Levenberg-Marquardt backpropagation learning algorithm. …”
Get full text
Get full text
Get full text
Thesis -
14
Automated mold defects classification in paintings: a comparison of machine learning and rule-based techniques.
Published 2025“…Subsequently, these regions are classified as mold defects using either morphological filtering or machine learning models such as Classification and Regression Trees (CART) and Linear Discriminant Analysis (LDA). …”
Get full text
Get full text
Get full text
Article -
15
-
16
Automatic detection and indication of pallet-level tagging from rfid readings using machine learning algorithms
Published 2020“…Different machine learning classifiers were tested based on the significant features, namely the Artificial Neural Network, Decision Tree, Random Forest, Naive Bayes Support Vector Machine, and k-Nearest Neighbors. …”
Get full text
Get full text
Thesis -
17
Content-based indexing of low resolution documents
Published 2016“…The assessment of the proposed indexing scheme is conducted based on recall and precision, a standard CBIR retrieval performance evaluation. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Arabic Speaker Identification System for Forensic Authentication Using K-NN Algorithm
Published 2023“…Classification (of information); Data mining; Digital forensics; Forestry; Learning algorithms; Loudspeakers; Motion compensation; Nearest neighbor search; Speech recognition; Trees (mathematics); K-near neighbor; Logistic model tree; Logistics model; Mel frequency cepstral co-efficient; Mel frequency cepstral coefficient; Mel-frequency cepstral coefficients; Mining classification; Model trees; Nearest-neighbour; Speaker identification systems; Authentication…”
Conference Paper -
19
Novel risk index for the identification of age-related macular degeneration using radon transform and DWT features
Published 2016“…Such a safe, non-contact and cost-effective platform can be used as a screening system for dry AMD. …”
Get full text
Get full text
Article -
20
Machine-learning approach using thermal and synthetic aperture radar data for classification of oil palm trees with basal stem rot disease
Published 2021“…The machine learning algorithm consistently performs well when presented with a well-balanced dataset. …”
Get full text
Get full text
Thesis
