Search Results - (( based evaluations _ algorithm ) OR ( user identification tree algorithm ))
Search alternatives:
- user identification »
- identification tree »
- based evaluations »
- tree algorithm »
-
1
Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman
Published 2022“…Plus, to analyse the efficiency of a detection model on keylogger dataset by evaluating a selection of attributes. Besides, to test the accuracy of detection models on keylogger dataset comparing two machine learning algorithms. …”
Get full text
Get full text
Student Project -
2
An improved framework for content and link-based web spam detection: a combined approach
Published 2021“…The link-based web spam detection framework initially exposed the relationship network behind the link spamming and then used the paid-links database algorithm, spam signals algorithm, and improved link farms algorithm for link-based web spam identification. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Investigating optimal smartphone placement for identifying stairs movement using machine learning
Published 2023“…Accurate identification of human activities is crucial in conveying essential gait information to users for the recognition of human movement activities. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Crown counting and mapping of missing oil palm tree using airborne imaging system
Published 2019“…This helps to facilitate semi-skillful users to implement the tree counting algorithms. …”
Get full text
Get full text
Thesis -
5
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…The database can be manipulated (insertion, retrieving, and deletion) rapidly using the Adelson Velskii and Landis (AVL) tree searching technique. The A VL tree is used to increase the compression ratio as its compression algorithm works efficiently for all types of data. …”
Get full text
Get full text
Thesis -
6
Detection of multiple mangoes using histogram of oriented gradient technique in aerial monitoring
Published 2016“…The project uses shape identification algorithm and Histogram of Oriented Gradient principle to detect and count the total number of mango on its tree using a quad copter with an attachable webcam. …”
Get full text
Get full text
Get full text
Article -
7
Rapid lard identification with portable electronic nose
Published 2017“…A portable reliable device with an ability to identify lard rapidly can be convenient to users concerned about lard adulteration. The prototype was examined using K-Nearest Neighbors algorithm (KNN), Support Vector Machine (SVM), Bagged Trees and Simple Tree, and can identify lard with the highest accuracy of 95.6% among three types of fat (lard, chicken and beef) in liquid form over a certain range of temperature using KNN.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Rapid lard identification with portable electronic nose
Published 2017“…A portable reliable device with an ability to identify lard rapidly can be convenient to users concerned about lard adulteration. The prototype was examined using K-Nearest Neighbors algorithm (KNN), Support Vector Machine (SVM), Bagged Trees and Simple Tree, and can identify lard with the highest accuracy of 95.6 among three types of fat (lard, chicken and beef) in liquid form over a certain range of temperature using KNN. © Published under licence by IOP Publishing Ltd.…”
Get full text
Get full text
Article -
9
-
10
Sudoku Generator based on hybrid algorithm / Faridah Abdul Rahman
Published 2012“…After testing and evaluation the prototype, the result shows that the Sudoku generator based on hybrid algorithm takes more times on solving the Sudoku. …”
Get full text
Get full text
Thesis -
11
Performance Evaluation of Vector Evaluated Gravitational Search Algorithms Based on ZDT Test Functions
Published 2014“…This paper presents a performance evaluation of Vector Evaluated Gravitational Search Algorithm (VEGSA), namely VEGSA-I and VEGSA-II algorithms, for multi-objective optimization problems. …”
Get full text
Get full text
Get full text
Article -
12
Standardizing and weighting the evaluation criteria of many-objective optimization competition algorithms based on fuzzy delphi and fuzzy-weighted zero-inconsistency methods
Published 2021“…The evaluation criteria of Many Objective Optimization algorithm (MaOO) play a critical role in evaluating the competition MaOO algorithms. …”
Get full text
Get full text
Thesis -
13
Efficient genetic partitioning-around-medoid algorithm for clustering
Published 2019“…However, the complexity of the kmedoid based algorithms in general is more than the complexity of the k-means based algorithms. …”
Get full text
Get full text
Thesis -
14
Evaluation of Vector Evaluated Particle Swarm Optimisation Enhanced with Non-dominated Solutions and Multiple Nondominated Leaders based on WFG Test Functions
Published 2014“…The improved VEPSO algorithms have been subjected to a series of numerical experiments based on ZDT benchmark datasets. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Optimizing large scale combinatorial problems using multiple ant colonies algorithm based on pheromone evaluation technique
Published 2008“…The new algorithm is based on the ant colony system and utilizes average and maximum pheromone evaluation mechanisms. …”
Get full text
Get full text
Get full text
Article -
16
Objective and Subjective Evaluations of Adaptive Noise Cancellation Systems with Selectable Algorithms for Speech Intelligibility
Published 2018“…Adaptive Noise Cancellation (ANC) systems with selectable algorithms refer to ANC systems that are able to change the adaptation algorithm based on the eigenvalue spread of the noise. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Efficient signaling schedule for centralized and distributed scheduling algorithms for wimax multi-hop relay networks
Published 2012“…On the other hand, the proposed distributed scheduling algorithm (MR-DSA) was evaluated by comparing its performance against performances of Greedy and the factor-graph-based low-complexity distributed scheduling algorithm (FGDS) algorithms in terms of delay, throughput, and overhead. …”
Get full text
Get full text
Thesis -
18
Deadline based performance evaluation of job scheduling algorithms
Published 2012Get full text
Citation Index Journal -
19
Development of high quality speech compression system for Quranic recitation based on modified CELP algorithm
Published 2013“…Lastly, we evaluate the performance of the developed algorithm objectively using PESQ (Perceptual Evaluation of Speech Quality). …”
Get full text
Get full text
Get full text
Proceeding Paper -
20
An adaptive routing algorithm: enhanced confidence-based Q routing algorithm in network traffic
Published 2004“…Confidence-based Q (CQ) Routing Algorithm is an adaptive network routing algorithm. …”
Get full text
Get full text
Get full text
Article
