Search Results - (( data distribution ((force algorithm) OR (tree algorithm)) ) OR ( _ evaluation a algorithm ))
Search alternatives:
- data distribution »
- force algorithm »
- tree algorithm »
- evaluation a »
- a algorithm »
-
1
Optimized routing algorithm for mobile multicast source in Wireless Mesh Networks
Published 2015“…Simulation results show that the proposed algorithm converges and outperforms a source based tree algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
3
E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm
Published 2022“…The model design is Decision Tree (DT) algorithm-based, with an approach to data balancing since the data set used is highly unbalanced and one more approach for feature selection. …”
Get full text
Get full text
Article -
4
A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem
Published 2016“…In supervised learning, class imbalanced data set is a state where the class distribution is not uniform among the classes. …”
Get full text
Get full text
Get full text
Thesis -
5
Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal
Published 2022“…Later, this MOCSSA is applied on service restoration to ensure the proposed algorithm technique is suitable in selecting the optimal switches for supply recovery after the line section is isolated from the system either by forced outage or planned outage purposes. …”
Get full text
Get full text
Thesis -
6
An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis
Published 2016“…On the other hand, Apriori-T with indexing enumeration tree is used for low cost FPM. A semiconductor manufacturing case study with Work In Progress data and true alarm data is used to proof the proposed algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…A clustering algorithm has been proposed to group the large nodes into clusters and organize these clusters into a tree structure. …”
Get full text
Get full text
Thesis -
8
A proactive energy awareness traffic routing for wireless sensor networks against energy sink-holes
Published 2019“…This is adopted in the proposed balanced energy-hole prevention method in tree topology (EBEHA-T) with a single sink. Next, the problem of large variations in energy consumptions with multiple sinks in merging tree-based multiple energy hole alleviation algorithm (MEHA-MT) is addressed. …”
Get full text
Get full text
Thesis -
9
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…Preventing DoS at the network or infrastructure level typically depends on implementing an IDS. This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
Get full text
Get full text
Article -
10
Enhancing benthic habitat mapping: A review of integrating satellite and side scan sonar data for improved classification accuracy
Published 2024“…This review not only highlights conceptual discoveries, but also provides recommendations for future research: (1) the need for comparative evaluation of classification algorithms to determine the optimal classifier; and (2) side-scan sonar-derived slope as a forcing factor to improve accuracy. …”
Get full text
Get full text
Article -
11
A Stacked Ensemble Deep Learning Approach For Imbalanced Multi-class Water Quality Index Prediction
Published 2024journal::journal article -
12
Shear strength test on unsaturated soil using natural microscopic surface tension force / Basharudin Abdul Hadi
Published 2017“…There were two sets of algorithms in developing the UPLRB ANN model and every algorithm set consisted of model inputs data preparation, neural network 29 30 base of the specimen until the flow ceased..…”
Get full text
Get full text
Book Section -
13
A stylometry approach for blind linguistic steganalysis model against translation-based steganography
Published 2023“…While targeted steganalysis is designed to attack a specific embedding algorithm, blind steganalysis use features extracted or selection from the medium to detect any anomalies that indicate a possibility that a secret data has been embedded within the medium. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Assessing green space cooling effects on the tropical urban microclimate / Siti Norafzan Buyadi
Published 2018“…Monowindow algorithm was used to generate temperature distribution maps of the study areas……”
Get full text
Get full text
Book Section -
15
Assessing green space cooling effects on the tropical urban microclimate / Siti Nor Afzan Buyadi
Published 2018“…Mono-window algorithm was used to generate temperature distribution maps of the study areas. …”
Get full text
Get full text
Thesis -
16
Optimized techniques for landslide detection and characteristics using LiDAR data
Published 2018“…In this task, two neural network algorithms, Recurrent Neural Networks (RNN) and Multi-Layer Perceptron Neural Networks (MLP-NN) were used and the hyper-parameters of the network architecture was optimized based on a systematic grid search. …”
Get full text
Get full text
Get full text
Thesis -
17
Content-based indexing of low resolution documents
Published 2016“…We present hierarchy indexing techniques, whose foundation are tree and clustering. K-means clustering are used for visual features like colour since their spatial distribution give a good image’s global information. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Nano-scale VLSI clock routing module based on useful-skew tree algorithm
Published 2006“…We implemented Useful-Skew Tree (UST) algorithm which is based on the deferred-merge embedding (DME) paradigm, as the clock layout synthesis engine. …”
Get full text
Get full text
Article -
19
-
20
