Search Results - (( data implication from algorithm ) OR ( peer evaluation method algorithm ))
Search alternatives:
- data implication »
- implication from »
- method algorithm »
- peer evaluation »
- from algorithm »
-
1
-
2
Framework for pedestrian walking behaviour recognition to minimize road accident
Published 2021“…Two sets of real-time data are presented in this work. The first one is related to the questionnaire data, consisting of 262 respondent samples, while the second set has 263 samples of pedestrian walking signals. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Framework for pedestrian walking behaviour recognition to minimize road accident
Published 2021“…Two sets of real-time data are presented in this work. The first one is related to the questionnaire data, consisting of 262 respondent samples, while the second set has 263 samples of pedestrian walking signals. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Using predictive analytics to solve a newsvendor problem / S. Sarifah Radiah Shariff and Hady Hud
Published 2023“…The best algorithm will not be the same for all the data sets. …”
Get full text
Get full text
Book Section -
5
-
6
Evaluation of Lightning Current Using Inverse Procedure Algorithm.
Published 2013Get full text
Get full text
Article -
7
-
8
-
9
-
10
-
11
Application Of Bibliometric Analysis on Root Growth Algorithm
Published 2024“…An article reviewed and analyzed bibliographic data on metaheuristics but is not specific on the topic of root growth algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Efficient genetic partitioning-around-medoid algorithm for clustering
Published 2019Get full text
Get full text
Thesis -
13
-
14
-
15
-
16
-
17
Malware Classification and Detection using Variations of Machine Learning Algorithm Models
Published 2025“…Types of attacks can be Ping of Death, flooding, remote-controlled attacks, UDP flooding, and Smurf Attacks. Attack data was obtained from the ClaMP dataset, which has an unbalanced data set, and has very high noise, so it is necessary to analyze data packets in network logs and optimize feature extraction which is then analyzed statistically with machine learning algorithms. …”
Get full text
Get full text
Get full text
Article -
18
-
19
-
20
