Search Results - (( based evaluation tree algorithm ) OR ( pattern detection system algorithm ))*
Search alternatives:
- pattern detection »
- based evaluation »
- system algorithm »
- evaluation tree »
- tree algorithm »
-
1
Evaluation of fall detection classification approaches
Published 2012“…Results show that the Multilayer Perceptron algorithm is the best option among other mentioned algorithms, due to its high accuracy in fall detection.…”
Get full text
Get full text
Conference or Workshop Item -
2
An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA
Published 2025“…However, these algorithms often fall short in consistently detecting and classifying network intrusions, particularly when distinctions between classes are subtle or when facing evolving attack patterns. …”
Get full text
Get full text
Get full text
Thesis -
3
Correlation analysis and predictive performance based on KNN and decision tree with augmented reality for nuclear primary cooling process / Ahmad Azhari Mohamad Nor
Published 2024“…These analyses provide nuanced insights into system operational dynamics and efficiency. Subsequently, predictive models employing k-nearest neighbour and decision tree algorithms are constructed and evaluated based on accuracy, precision, and recall metrics. …”
Get full text
Get full text
Thesis -
4
A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem
Published 2016“…There are two methods in dealing with imbalanced classification problem, which are based on data or algorithmic level. Data level based methods are meant to solve the imbalanced classification problem based on the idea of making both classes equal in number. …”
Get full text
Get full text
Get full text
Thesis -
5
A study on component-based technology for development of complex bioinformatics software
Published 2004“…From the enriched GO tree, the BTreeBicluster algorithm is applied during the clustering process. …”
Get full text
Get full text
Monograph -
6
Tree-based contrast subspace mining method
Published 2020“…The research works involve first preparing the real world numerical and categorical data sets. Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
Get full text
Get full text
Get full text
Thesis -
7
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis -
8
An early warning system for students at risk using supervised machine learning
Published 2024“…Besides, this study also focuses on the Decision Tree, Random Forest, and XGBoost models in the system. …”
Get full text
Get full text
Get full text
Article -
9
-
10
Laptop price prediction using decision tree algorithm / Nurnazifah Abd Mokti
Published 2024“…The project involves data collection, data preparation, and the implementation of the decision tree algorithm for price prediction. The decision tree's effectiveness and accuracy in predicting laptop prices are evaluated through rigorous testing and validation. …”
Get full text
Get full text
Thesis -
11
-
12
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Monograph -
13
Animal voice recognition for identification (ID) detection system
Published 2011“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
14
Dog voice identification (ID) for detection system
Published 2012“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
15
A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh
Published 2021“…The second and third scenarios evaluate the performance of Coalition-Based Index-Tree by examining the effects of Dynamic-Coalition framework and Static-Coalition algorithm on Coalition-Based Index-Tree framework. …”
Get full text
Get full text
Get full text
Thesis -
16
Process fault detection and diagnosis using Boolean representation on fatty acid fractionation column
Published 2003“…Through the proposed algorithm, various faults could be simulated and detected using the system. …”
Get full text
Get full text
Conference or Workshop Item -
17
Case Slicing Technique for Feature Selection
Published 2004“…This technique with k = 10 has been used in this thesis to evaluate the proposed approach. CST was compared to other selected classification methods based on feature subset selection such as Induction of Decision Tree Algorithm (ID3), Base Learning Algorithm K-Nearest Nighbour Algorithm (k-NN) and NaYve Bay~sA lgorithm (NB). …”
Get full text
Get full text
Thesis -
18
Image recognition using Artificial Immune systems approach
Published 2009Get full text
Working Paper -
19
Performance evaluation for different intrusion detection system algorithms using machine learning
Published 2018“…The objectives of this project is to evaluate the performance of various intrusion detection algorithms based on machine learning. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Visualisasi pohon sintaksis berasaskan model dan algoritma sintaks ayat bahasa Melayu
Published 2018“…These results proved that the algorithm and model, for syntactic tree output enhancement, are generalisable enough to be tested on other languages. …”
Get full text
Get full text
Get full text
Get full text
Thesis
