Search Results - (( data distribution ((force algorithm) OR (tree algorithm)) ) OR ( _ evaluation a algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm by Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik

    Published 2022
    “…The model design is Decision Tree (DT) algorithm-based, with an approach to data balancing since the data set used is highly unbalanced and one more approach for feature selection. …”
    Get full text
    Get full text
    Article
  4. 4

    A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem by Mohd Pozi, Muhammad Syafiq

    Published 2016
    “…In supervised learning, class imbalanced data set is a state where the class distribution is not uniform among the classes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal by Zainal, Mohamad Izwan

    Published 2022
    “…Later, this MOCSSA is applied on service restoration to ensure the proposed algorithm technique is suitable in selecting the optimal switches for supply recovery after the line section is isolated from the system either by forced outage or planned outage purposes. …”
    Get full text
    Get full text
    Thesis
  6. 6

    An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis by Ong, Phaik Ling

    Published 2016
    “…On the other hand, Apriori-T with indexing enumeration tree is used for low cost FPM. A semiconductor manufacturing case study with Work In Progress data and true alarm data is used to proof the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    A cluster-based hybrid replica control protocol for high availability in data grid by Mabni, Zulaile

    Published 2019
    “…A clustering algorithm has been proposed to group the large nodes into clusters and organize these clusters into a tree structure. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A proactive energy awareness traffic routing for wireless sensor networks against energy sink-holes by Mustafa, Mayada Salih Abdalla

    Published 2019
    “…This is adopted in the proposed balanced energy-hole prevention method in tree topology (EBEHA-T) with a single sink. Next, the problem of large variations in energy consumptions with multiple sinks in merging tree-based multiple energy hole alleviation algorithm (MEHA-MT) is addressed. …”
    Get full text
    Get full text
    Thesis
  9. 9

    An intelligent DDoS attack detection tree-based model using Gini index feature selection method by Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik, Atigh, Hayate El

    Published 2023
    “…Preventing DoS at the network or infrastructure level typically depends on implementing an IDS. This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
    Get full text
    Get full text
    Article
  10. 10

    Enhancing benthic habitat mapping: A review of integrating satellite and side scan sonar data for improved classification accuracy by Yeong, Wei Yi, Chong, Wei Sheng, Ching Hue, Imelus Nius

    Published 2024
    “…This review not only highlights conceptual discoveries, but also provides recommendations for future research: (1) the need for comparative evaluation of classification algorithms to determine the optimal classifier; and (2) side-scan sonar-derived slope as a forcing factor to improve accuracy. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Shear strength test on unsaturated soil using natural microscopic surface tension force / Basharudin Abdul Hadi by Abdul Hadi, Basharudin

    Published 2017
    “…There were two sets of algorithms in developing the UPLRB ANN model and every algorithm set consisted of model inputs data preparation, neural network 29 30 base of the specimen until the flow ceased..…”
    Get full text
    Get full text
    Book Section
  13. 13

    A stylometry approach for blind linguistic steganalysis model against translation-based steganography by Mohd Lokman, Syiham

    Published 2023
    “…While targeted steganalysis is designed to attack a specific embedding algorithm, blind steganalysis use features extracted or selection from the medium to detect any anomalies that indicate a possibility that a secret data has been embedded within the medium. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Assessing green space cooling effects on the tropical urban microclimate / Siti Norafzan Buyadi by Buyadi, Siti Norafzan

    Published 2018
    “…Monowindow algorithm was used to generate temperature distribution maps of the study areas……”
    Get full text
    Get full text
    Book Section
  15. 15

    Assessing green space cooling effects on the tropical urban microclimate / Siti Nor Afzan Buyadi by Buyadi, Siti Nor Afzan

    Published 2018
    “…Mono-window algorithm was used to generate temperature distribution maps of the study areas. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Optimized techniques for landslide detection and characteristics using LiDAR data by Mezaal, Mustafa Ridha

    Published 2018
    “…In this task, two neural network algorithms, Recurrent Neural Networks (RNN) and Multi-Layer Perceptron Neural Networks (MLP-NN) were used and the hyper-parameters of the network architecture was optimized based on a systematic grid search. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Content-based indexing of low resolution documents by Md Nor, Danial

    Published 2016
    “…We present hierarchy indexing techniques, whose foundation are tree and clustering. K-means clustering are used for visual features like colour since their spatial distribution give a good image’s global information. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Nano-scale VLSI clock routing module based on useful-skew tree algorithm by Eik Wee, Chew, Heng Sun, Ch'ng, Shaikh-Husin, Nasir, Hani, Mohamed Khalil

    Published 2006
    “…We implemented Useful-Skew Tree (UST) algorithm which is based on the deferred-merge embedding (DME) paradigm, as the clock layout synthesis engine. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20