Search Results - (( based evaluation step algorithm ) OR ( identification _ ((rsa algorithm) OR (tree algorithm)) ))
Search alternatives:
- based evaluation »
- evaluation step »
- step algorithm »
- tree algorithm »
- rsa algorithm »
-
1
Detection and classification of conflict flows in SDN using machine learning algorithms
Published 2021“…Using a range flows from 1000 to 100000 with an increment of 10000 flows per step in two network topologies namely, Fat Tree and Simple Tree Topologies, that were created using the Mininet simulator and connected to the Ryu controller, the performance of the proposed algorithms was evaluated for efficiency and effectiveness across a variety of evaluation metrics. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
2
Object-based imagery analysis for automatic urban tree species detection using high resolution satellite image
Published 2016“…This study also explores the use and comparison of object-based classification, and two common pixel-based classification methods namely, maximum likelihood and support vector machines based on WorldView-2 satellite imagery to evaluate the potential of the object-based in compare to pixel-based to detect urban tree species. …”
Get full text
Get full text
Thesis -
3
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…After evaluating the results of these algorithms, a hybrid Artificial Neural Network-based Imperial Competitive Algorithm (ANN-ICA) was presented in the deployment step of the proposed methodology to identify the structural damage of illustrative structures. …”
Get full text
Get full text
Get full text
Thesis -
4
-
5
RSA authentication mechanisms in control grid computing environment using Gridsim toolkit
Published 2015“…In order to satisfy the security need of grid computing environment, we design an alternative authentication mechanism using RSA algorithm to ensure the user identification, and carry out the experiment in the Gridsim toolkit simulator.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Arabic Speaker Identification System for Forensic Authentication Using K-NN Algorithm
Published 2023“…Classification (of information); Data mining; Digital forensics; Forestry; Learning algorithms; Loudspeakers; Motion compensation; Nearest neighbor search; Speech recognition; Trees (mathematics); K-near neighbor; Logistic model tree; Logistics model; Mel frequency cepstral co-efficient; Mel frequency cepstral coefficient; Mel-frequency cepstral coefficients; Mining classification; Model trees; Nearest-neighbour; Speaker identification systems; Authentication…”
Conference Paper -
7
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
8
Improved random forest for feature selection in writer identification
Published 2015“…Discretization process was proven to increase the classification performances and improved the identification performance in WI. An algorithm and framework of Improved Random Forest (IRF) tree was applied for feature selection process. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Novel Adaptive Bacterial Foraging Algorithms for Global Optimisation with Application to Modelling of a TRS
Published 2015“…The constant step size in the original bacterial foraging algorithm causes oscillation in the convergence graph where bacteria are not able to reach the optimum location with large step size, hence reducing the accuracy of the final solution. …”
Get full text
Get full text
Article -
10
Iterative And Single-Step Solutions Of Two Dimensional Time-Domain Inverse Scattering Problem Featuring Ultra Wide Band Sensors
Published 2010“…The image reconstruction algorithm was based on the gradient minimization of an augmented cost function defined as the difference between measured and calculated fields. …”
Get full text
Get full text
Thesis -
11
Tree-based contrast subspace mining method
Published 2020“…The research works involve first preparing the real world numerical and categorical data sets. Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
Get full text
Get full text
Get full text
Thesis -
12
The stopping rules for winsorized tree
Published 2017“…This mechanism is controlled by the proposed algorithm. In winsorized tree, data are screened for identifying outlier.If outlier is detected, the value is neutralized using winsorize approach. …”
Get full text
Get full text
Conference or Workshop Item -
13
Investigating optimal smartphone placement for identifying stairs movement using machine learning
Published 2023“…The data was trained against 6 machine learning algorithms namely Decision Tree, Logistic Regression, Naive Bayes, Random Forest, Neural Networks and KNN. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Multistep forecasting for highly volatile data using new algorithm of Box-Jenkins and GARCH
Published 2018“…In evaluating the performance of the multistep ahead forecast, the proposed algorithm is employed to daily world gold price series of 5-year data. …”
Get full text
Get full text
Conference or Workshop Item -
15
Algorithmic approaches in model selection of the air passengers flows data
Published 2015“…Algorithm is an important element in any problem solving situation.In statistical modelling strategy, the algorithm provides a step by step process in model building, model testing, choosing the ‘best’ model and even forecasting using the chosen model.Tacit knowledge has contributed to the existence of a huge variability in manual modelling process especially between expert and non-expert modellers.Many algorithms (automated model selection) have been developed to bridge the gap either through single or multiple equation modelling.This study aims to evaluate the forecasting performances of several selected algorithms on air passengers flow data based on Root Mean Square Error (RMSE) and Geometric Root Mean Square Error (GRMSE).The findings show that multiple models selection performed well in one and two step-ahead forecast but was outperformed by single model in three step-ahead forecasts.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Effects of Different Superpixel Algorithms on Interactive Segmentations
Published 2022“…Though employed as pre-processing step in many interactive segmentation algorithms, to date, no study has been conducted to assess the effects of such incorporations on the segmentation algorithms. …”
Get full text
Get full text
Get full text
Article -
17
Enhanced Image View Synthesis Using Multistage Hybrid Median Filter For Stereo Images
Published 2018“…Disparity depth map estimation of stereo matching algorithm is one of the most active research topics in computer vision.In the field of image processing,many existing stereo matching algorithms to obtain disparity depth map are developed and designed with low accuracy.To improve the accuracy of disparity depth map is quite challenging and difficult especially with uncontrolled dynamic environment.The accuracy is affected by many unwanted aspects including random noises,horizontal streaks,low texture,depth map non-edge preserving, occlusion,and depth discontinuities.Thus,this research proposed a new robust method of hybrid stereo matching algorithm with significant accuracy of computation.The thesis will present in detail the development,design, and analysis of performance on Multistage Hybrid Median Filter (MHMF).There are two main parts involved in our developed method which combined in two main stages.Stage 1 consists of the Sum of Absolute Differences (SAD) from Basic Block Matching (BBM) algorithm and the part of Scanline Optimization (SO) from Dynamic Programming (DP) algorithm.While,Stage 2 is the main core of our MHMF as a post-processing step which included segmentation,merging, and hybrid median filtering.The significant feature of the post-processing step is on its ability to handle efficiently the unwanted aspects obtained from the raw disparity depth map on the step of optimization.In order to remove and overcome the challenges unwanted aspects, the proposed MHMF has three stages of filtering process along with the developed approaches in Stage 2 of MHMF algorithm.There are two categories of evaluation performed on the obtained disparity depth map: subjective evaluation and objective evaluation.The objective evaluation involves the evaluation on Middlebury Stereo Vision system and evaluation using traditional methods such as Mean Square Errors (MSE),Peak to Signal Noise Ratio (PSNR) and Structural Similarity Index Metric (SSIM).Based on the results of the standard benchmarking datasets from Middlebury,the proposed algorithm is able to reduce errors of non-occluded and all errors respectively.While,the subjective evaluation is done for datasets captured from MV BLUE FOX camera using human's eyes perception.Based on the results,the proposed MHMF is able to obtain accurate results, specifically 69% and 71% of non-occluded and all errors for disparity depth map, and it outperformed some of the existing methods in the literature such as BBM and DP algorithms.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
A comparative evaluation of PID-based optimisation controller algorithms for DC motor
Published 2023Article -
19
Ensemble-based machine learning algorithms for classifying breast tissue based on electrical impedance spectroscopy
Published 2020“…Therefore, we aimed to classify six classes of freshly excised tissues from a set of electrical impedance measurement variables using five ensemble-based machine learning (ML) algorithms, namely, the random forest (RF), extremely randomized trees (ERT), decision tree (DT), gradient boosting tree (GBT) and AdaBoost (Adaptive Boosting) (ADB) algorithms, which can be subcategorized as bagging and boosting methods. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Enhanced Community Detection Based On Cross Time For Higher Visibility In Supply Chain: A Six-Steps Model Framework
Published 2019“…This paper proposed six steps model framework that aim: (1) To construct the nodes and vertices for temporal graph representing the relationship in supply chain network; (2) To propose an enhanced temporal community detection algorithm in graph analytics based on Cross-time approach and (3) To evaluate the enhanced temporal community detection algorithm in graph analytics for representing relationship in supply chain network based on external and internal quality analysis. …”
Get full text
Get full text
Get full text
Article
