Search Results - (( data validation using algorithm ) OR ( data evaluation method algorithm ))
Search alternatives:
- validation using »
- method algorithm »
- data validation »
- using algorithm »
- data evaluation »
-
1
Case Slicing Technique for Feature Selection
Published 2004“…Since the 1960s, many algorithms for data classification have been proposed. …”
Get full text
Get full text
Thesis -
2
System identification using Extended Kalman Filter
Published 2017“…In order to evaluate the performance of the EKF learning algorithm, the proposed algorithm validation were analyzed using model validation methods as a checker such as One Step Ahead (OSA) and correlation coefficient (R2). …”
Get full text
Get full text
Student Project -
3
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Evaluation and Comparative Analysis of Feature Extraction Methods on Image Data to increase the Accuracy of Classification Algorithms
Published 2024“…The classification algorithm used in this research is the Convolutional Neural Network (CNN) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Evaluation of Lightning Current Using Inverse Procedure Algorithm.
Published 2013“…In order to validate the proposed method, a set of measured electromagnetic fields are applied on proposed algorithm and the evaluated currents are compared to the corresponding measured current as well as the results are discussed accordingly. …”
Get full text
Get full text
Article -
6
On density-based data streams clustering algorithms: A survey
Published 2017“…Moreover, we investigate the evaluation metrics used in validating cluster quality and measuring algorithms’ performance. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
Published 2018“…Hence, a validation protocol algorithm based on hash function labelling provides a one-time security header for transferable files that protects data in transit against any unauthorized injection. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…It involves development of Max-Min Rule-Based Classification Algorithm. The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. …”
Get full text
Get full text
Thesis -
9
Evaluation of the Transfer Learning Models in Wafer Defects Classification
Published 2022“…A 20-fold cross-validation was used to validate the score metrics. Almost all the algorithms score 85% and above in terms of accuracy, precision and recall…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Robust generalized multiplicative scatter correction algorithm on pretreatment of near infrared spectral data
Published 2018“…To encounter these, a robust pretreatment of NIR spectral data is needed to correct the spectra before it is used for post-processing using any statistical method. …”
Get full text
Get full text
Article -
11
Efficient genetic partitioning-around-medoid algorithm for clustering
Published 2019“…Lastly, in order to externally judge the validity of these types of clustering algorithms, there is a need for a method to correctly and efficiently evaluate their variant multiclass clustering results. …”
Get full text
Get full text
Thesis -
12
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
13
Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi
Published 2017“…Testing of the application are using 10-Fold Cross Validation technique. 90% of the data be used as a training and another 10% be used for the testing part. …”
Get full text
Get full text
Thesis -
14
Data-driven continuous-time Hammerstein modeling with missing data using improved Archimedes optimization algorithm
Published 2024“…Models were tested with both complete and missing output data to evaluate the robustness of the IAOA-based method. …”
Get full text
Get full text
Get full text
Article -
15
Evaluations of oil palm fresh fruit bunches maturity degree using multiband spectrometer
Published 2017“…Furthermore, the Lazy-IBK algorithm have been validated to produce the best classifier model, with the machine learning algorithm performance of 65.26%, recall of 65.3%, and 65.4% F-measured as compared to other evaluated machine learning classifier algorithms proposed within the WEKA data mining algorithm. …”
Get full text
Get full text
Get full text
Thesis -
16
Using algorithmic taxonomy to evaluate lecturer workload
Published 2006“…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Get full text
Article -
17
The Parallel Fuzzy C-Median Clustering Algorithm Using Spark for the Big Data
Published 2024“…Therefore, we develop a Parallel Fuzzy C-Median Clustering Algorithm Using Spark for Big Data that can handle large datasets while maintaining high accuracy and scalability. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Parameter extraction of photovoltaic module using hybrid evolutionary algorithm
Published 2023Conference Paper -
19
Development of a new robust hybrid automata algorithm based on surface electromyography (SEMG) signal for instrumented wheelchair control
Published 2020“…Total of ten control methods determined from population and individual data were tested against another 10 healthy persons to evaluate the algorithm performance. …”
Get full text
Get full text
Thesis -
20
Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal
Published 2006“…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Conference or Workshop Item
