Search Results - (( model evaluation metric algorithm ) OR ( level classification based algorithm ))
Search alternatives:
- level classification »
- classification based »
- evaluation metric »
- model evaluation »
- metric algorithm »
-
1
Software defect prediction framework based on hybrid metaheuristic optimization methods
Published 2015“…For the purpose of this study, ten classification algorithms have been selected. The selection aims at achieving a balance between established classification algorithms used in software defect prediction. …”
Get full text
Get full text
Get full text
Thesis -
2
Predicting building damage grade by earthquake: a Bayesian Optimization-based comparative study of machine learning algorithms
Published 2024“…Using metrics, this study evaluates Random Forest, ElasticNet, and Decision Tree algorithms. …”
Get full text
Get full text
Article -
3
A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem
Published 2016“…There are two methods in dealing with imbalanced classification problem, which are based on data or algorithmic level. …”
Get full text
Get full text
Get full text
Thesis -
4
Automatic detection and indication of pallet-level tagging from rfid readings using machine learning algorithms
Published 2020“…Furthermore, the efficacy of different models based on heuristic hyperparameter tuning is evaluated in which the different kernel function for Support Vector Machine, various distance metrics of k-Nearest Neighbors. …”
Get full text
Get full text
Thesis -
5
Phishing image spam classification research trends: Survey and open issues
Published 2020“…This study reviews articles on phishing image spam classification published from 2006 to 2020 based on spam classification application domains, datasets, features sets, spam classification methods, and the measurement metrics adopted in the existing studies. …”
Get full text
Get full text
Article -
6
Malicious URL Detection with Distributed Representation and Deep Learning
Published 2023Conference Paper -
7
Bacterial image analysis using multi-task deep learning approaches for clinical microscopy
Published 2024“…The performance metrics of the models were compared and analysed. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms
Published 2016“…The latest effort to solve this selection problem is the development of the metrics selection model that uses genetic algorithm (GA). …”
Get full text
Get full text
Thesis -
9
Improving Accuracy Metric with Precision and Recall Metrics for Optimizing Stochastic Classifier
Published 2011“…In this study, we propose a new evaluation metric that combines accuracy metric with the extended precision and recall metrics to negate these detrimental effects. …”
Get full text
Get full text
Proceeding -
10
Improving accuracy metric with precision and recall metrics for optimizing stochastic classifier
Published 2011“…In this study, we propose a new evaluation metric that combines accuracy metric with the extended precision and recall metrics to negate these detrimental effects. …”
Get full text
Get full text
Conference or Workshop Item -
11
Improving accuracy metric with precision and recall metrics for optimizing stochastic classifier
Published 2011“…In this study, we propose a new evaluation metric that combines accuracy metric with the extended precision and recall metrics to negate these detrimental effects.We refer the new evaluation metric as optimized accuracy with recall-precision (OARP). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
A Systematic Literature Review of Machine Learning Methods for Short-term Electricity Forecasting
Published 2023Conference Paper -
13
Role Minimization As An Optimization Metric In Role Mining Algorithms : A Literature Review
Published 2018“…A recent access control model that could accommodate a dynamic structure such as cloud computing can be recognized as role based access control and the role management process of this access control can be identified as role mining.The current trend in role based access control is the role mining problem that can be described as the difficulty to uncover an optimum set of roles from the userpermission assignment.To solve this problem,the researchers have proposed role mining algorithms to produce role set and among the existing algorithms there is an intrinsic topic of the common perception to evaluate the goodness of the generated role set.Eventually,the value of the identified roles could be measured by the preferred metric of optimality namely the number of roles,sizes of userassignment and permission-assignment and Weighted Structural Complexity.Until now, there is some disagreement on the optimization metric but notably many researchers have agreed on the minimization of the number of roles as a solid metric.This paper discusses an overview of the current state-of-the-art on the recent role mining algorithms that focus on role minimization as an optimization metric to evaluate the goodness of the identified roles. …”
Get full text
Get full text
Get full text
Article -
14
Multi-Class Multi-Level Classification of Mental Health Disorders Based on Textual Data from Social Media
Published 2024“…The results of the experiments show that the MCML classification algorithm successfully performs detailed classification and produces promising results for each classification level. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Efficient region of interest based metric learning for effective open world deep face
Published 2022“…To establish the effectiveness, we investigated various threshold finding strategies for five state-of-the-art face recognition algorithms for open world adaptation on different datasets.We also proposed a novel performance evaluation metric for FR algorithms on imbalanced datasets. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
16
Evaluation of the Transfer Learning Models in Wafer Defects Classification
Published 2022Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Scheduling tight deadlines for scientific workflows in the cloud
Published 2018“…The results show that the PDC performs better in term of success rate metric while the DCCP algorithm has better performance in term of normalized cost metric. …”
Get full text
Get full text
Thesis -
18
Symmetric Key Size for Different Level of Information Classification
Published 2006“…Confidential information can be categorized into various levels of classification. The classification depends on the level of damage to an organization or to national security when the information is disclosed. …”
Get full text
Get full text
Conference or Workshop Item -
19
Cross-project software defect prediction
Published 2022“…In this work, five research questions covering the classification algorithms, dataset, independent variables, performance evaluation metrics used in CPDP studies, and as well as the performance of individual machine learning classification algorithms in predicting software defects across different software projects were addressed accordingly. …”
Get full text
Get full text
Article -
20
Classification models for higher learning scholarship award decisions
Published 2018“…Each model was evaluated using technical evaluation metric, such contingency table metrics, and accuracy, precision, and recall measures. …”
Get full text
Get full text
Get full text
Article
