Search Results - (( model mitigating ((bat algorithm) OR (_ algorithm)) ) OR ( user identification svm algorithm ))
Search alternatives:
- user identification »
- identification svm »
- bat algorithm »
- svm algorithm »
-
1
Development of interactive application for classification of Artocarpus Species
Published 2020“…The combination of Prewitt algorithm, Canny alogorithm, Gray-Level co-occurrence matrix will be used in SVM. …”
Get full text
Undergraduate Final Project Report -
2
-
3
Rapid lard identification with portable electronic nose
Published 2017“…A portable reliable device with an ability to identify lard rapidly can be convenient to users concerned about lard adulteration. The prototype was examined using K-Nearest Neighbors algorithm (KNN), Support Vector Machine (SVM), Bagged Trees and Simple Tree, and can identify lard with the highest accuracy of 95.6% among three types of fat (lard, chicken and beef) in liquid form over a certain range of temperature using KNN.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Rapid lard identification with portable electronic nose
Published 2017“…A portable reliable device with an ability to identify lard rapidly can be convenient to users concerned about lard adulteration. The prototype was examined using K-Nearest Neighbors algorithm (KNN), Support Vector Machine (SVM), Bagged Trees and Simple Tree, and can identify lard with the highest accuracy of 95.6 among three types of fat (lard, chicken and beef) in liquid form over a certain range of temperature using KNN. © Published under licence by IOP Publishing Ltd.…”
Get full text
Get full text
Article -
5
-
6
An improved framework for content and link-based web spam detection: a combined approach
Published 2021“…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. The link-based web spam detection framework initially exposed the relationship network behind the link spamming and then used the paid-links database algorithm, spam signals algorithm, and improved link farms algorithm for link-based web spam identification. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
GA-based feature subset selection in a spam/non-spam detection system
Published 2012“…Spam has created a significant security problem for computer users everywhere. Spammers take an advantage of defrauds to cover parts of messages that can be used for identification of spam. …”
Get full text
Get full text
Conference or Workshop Item -
8
Managing and controlling design process issues by using stepwise approach modelling
Published 2016“…Furthermore, we illustrated the design process issues were mitigated by control techniques in Table 40. However, we need to combine more techniques and artificial optimal algorithms to mitigate the issues in software design process.…”
Get full text
Get full text
Get full text
Article -
9
Quantitative and intelligent risk models in risk management for constructing software development projects: A review
Published 2016“…Indeed, this area needs more effort from scholars and researchers in quantitative and intelligent risk models to mitigate risks. As future work, we will use these hybrid models of quantitative and intelligent for mitigating software risks in cloud computing such as neural network, genetic algorithm and others artificial intelligence techniques.…”
Get full text
Get full text
Get full text
Get full text
Article -
10
Nonlinear THF-FXLMS algorithm for active noise control with loudspeaker nonlinearity
Published 2016“…The proposed THF-NLFXLMS algorithm, models the nonlinear secondary path and applies the estimated degree of nonlinearity in the control algorithm design. …”
Get full text
Get full text
Get full text
Article -
11
Enhancing river health monitoring: Developing a reliable predictive model and mitigation plan
Published 2024“…Thus, there is a pressing need to create a precise and robust water quality prediction model. The dynamic and non-linear characteristics of water quality parameters pose significant challenges for conventional machine learning algorithms like multi-linear regression, as they struggle to capture these complexities. …”
Article -
12
Nonlinear adaptive algorithm for active noise control with loudspeaker nonlinearity
Published 2014“…The proposed THF-NLFXLMS algorithm models the Wiener secondary path and applies the estimated degree of nonlinearity of the nonlinear secondary path in the control algorithm design. …”
Get full text
Get full text
Thesis -
13
A novel peak shaving algorithm for islanded microgrid using battery energy storage system
Published 2020“…Effectiveness of the proposed algorithm was tested with a BESS-based MATLAB/Simulink model of an actual microgrid under realistic load conditions which were recorded. …”
Get full text
Get full text
Article -
14
A novel peak shaving algorithm for islanded microgrid using battery energy storage system
Published 2020“…Effectiveness of the proposed algorithm was tested with a BESS-based MATLAB/Simulink model of an actual microgrid under realistic load conditions which were recorded. …”
Get full text
Get full text
Article -
15
Resource allocation techniques for interference mitigation in macro and femtocell heterogeneous network-based LTE system
Published 2017“…The first proposed hybrid approach consists of two combined schemes, termed as Resource Allocation based Fractional Frequency Reuse and Graph Connectivity algorithm (RAFFRGC). The second proposed interference mitigation technique is a full frequency reuse termed as Resource Allocation based Cuckoo Search Algorithm (RACSA). …”
Get full text
Get full text
Get full text
Thesis -
16
A selective mitigation technique of soft errors for DNN models used in healthcare applications: DenseNet201 case study
Published 2021“…In this paper, we propose a selective mitigation technique that relies on in-depth analysis. …”
Get full text
Get full text
Get full text
Article -
17
GEOSPATIAL TEMPORAL FRAMEWORK ON LANDSLIDES MITIGATION STRATEGIES FOR PIPELINES
Published 2023“…AUC values of 0.879 were obtained for the susceptibility models developed from the SVM algorithms, indicating outstanding predictive performance.…”
Get full text
Get full text
Thesis -
18
-
19
Data-driven continuous-time Hammerstein modeling with missing data using improved Archimedes optimization algorithm
Published 2024“…This research introduces the improved Archimedes optimization algorithm (IAOA) for data-driven modeling of continuous-time Hammerstein models with missing data. …”
Get full text
Get full text
Get full text
Article -
20
Performance comparison of different machine learning algorithms on a time-series of covid-19 data: A case study for Saudi Arabia
Published 2021“…Several machine learning models and related algorithms were developed for prediction of total cases and total deaths. …”
Get full text
Get full text
Article
