Search Results - (( model validation tool algorithm ) OR ( level classification _ algorithm ))
Search alternatives:
- level classification »
- model validation »
- validation tool »
- tool algorithm »
-
1
A Predictive Classification Model For Running Injury
Published 2022“…The J48, SMO, Random Forest, and Simple Logistic algorithms were used for 10-fold cross validation mode classification benchmarked on the ZeroR baseline algorithm. …”
Get full text
Get full text
Monograph -
2
Evaluations of oil palm fresh fruit bunches maturity degree using multiband spectrometer
Published 2017“…Furthermore, the Lazy-IBK algorithm have been validated to produce the best classifier model, with the machine learning algorithm performance of 65.26%, recall of 65.3%, and 65.4% F-measured as compared to other evaluated machine learning classifier algorithms proposed within the WEKA data mining algorithm. …”
Get full text
Get full text
Get full text
Thesis -
3
Classification of Cognitive Frailty in Elderly People from Blood Samples using Machine Learning
Published 2021“…A total of 7 different classification algorithms were used to predict between 6 levels of CF, the Robust and Non-Robust groups, as well as the Robust and Frail with MCI groups. …”
Get full text
Get full text
Conference or Workshop Item -
4
Diabetic retinopathy detection using Gray-Level Co-Occurrence Matrix / Aliff Azfar Aris
Published 2022“…The classification was performed by using Support Vector Machine (SVM) to generate the cross-validation accuracy to determine the learning algorithm’s performance. …”
Get full text
Get full text
Thesis -
5
Intelligent image noise types recognition and denoising system using deep learning / Khaw Hui Ying
Published 2019“…Targeting on impulse noise density as high as 50%, 60%, 70%, 80% and 90%, the model has been trained with a massive collection of natural images and 14 standard testing images are used for validation purposes. …”
Get full text
Get full text
Get full text
Thesis -
6
Machine Learning based Predictive Modelling of Cybersecurity Threats Utilising Behavioural Data
Published 2023“…Five supervised machine learning methods are being tested which are: Regression Logistics, K-Nearest Neighbour (KNN), Decision Tree (DT), Support Vector Machine (SVM), and Naïve Bayesian Classifier with the aid of a tool, RapidMiner. The algorithms are used to construct, test, and validate three categories of cybercrime threat (Malware, Social Engineering, and Password Attack) predictive models. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Extrema Points Application In Determining Iris Region Of Interest
Published 2019“…Hence, to address this issue, this paper proposed a method of iris localisation in the case of ideal and non-ideal iris images. In this study, the algorithm was based on finding the classification for the region of interest (ROI) with the help of a Support Vector Machine (SVM) by applying a histogram of grey level values as a descriptor in each region from the region growing technique. …”
Get full text
Get full text
Get full text
Article -
8
Machine-learning approach using thermal and synthetic aperture radar data for classification of oil palm trees with basal stem rot disease
Published 2021“…To identify non-infected and BSR-infected trees, the WEKA tool version 3.8.5 was used for classification. …”
Get full text
Get full text
Thesis -
9
Implementation of Hybrid Indexing, Clustering and Classification Methods to Enhance Rural Development Programme in South Sulawesi
Published 2024“…Using the cosine similarity algorithm for knowledge recommendation is village identified, utilizing community feedback as the foundation. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
An experimental validation and optimisation tool path strategy for thin walled structure
Published 2011“…The target was to develop models which mimic the actual cutting process using the finite element method (FEM), to validate the developed tool path strategy algorithm with the actual machining process and to programme the developed algorithm into the software. …”
Get full text
Get full text
Get full text
Article -
11
Modeling and optimization of multi-holes drilling path using Particle Swarm Optimization
Published 2018“…Then a machining experiment has been conducted to validate the optimization results. The optimization results clearly indicated that the PSO algorithm outperformed all comparison algorithms for the drilling tool path problem. …”
Get full text
Get full text
Research Report -
12
Optimization of multi-holes drilling toolpath using tiki-taka algorithm
Published 2024“…The research methodology involves problem modeling, algorithm development, and validation. The TSP concept formulated the MDMT problem, representing holes as cities and tools as a salesman in finding the shortest path to develop a mathematical model or fitness function. …”
Get full text
Get full text
Thesis -
13
Optimization of multi-holes drilling path using particle swarm optimization
Published 2022“…One way to improve the multi-hole drilling is by optimising the tool path in the process. This research aims to model and optimise multi-hole drilling problems using Particle Swarm Optimisation (PSO) algorithm. …”
Get full text
Get full text
Thesis -
14
Multi-Class Multi-Level Classification of Mental Health Disorders Based on Textual Data from Social Media
Published 2024“…The results of the experiments show that the MCML classification algorithm successfully performs detailed classification and produces promising results for each classification level. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Symmetric Key Size for Different Level of Information Classification
Published 2006“…Confidential information can be categorized into various levels of classification. The classification depends on the level of damage to an organization or to national security when the information is disclosed. …”
Get full text
Get full text
Conference or Workshop Item -
16
Minimizing Classification Errors in Imbalanced Dataset Using Means of Sampling
Published 2023“…Classification (of information); Learning algorithms; Students; Class imbalance; Data level; Over sampling; Performance prediction; SMOTE; Spread subsampling; Student performance; Student performance prediction; Under-sampling; Machine learning…”
Conference Paper -
17
Develpoment of combinatorial optimisation for cutting tool path strategy
Published 2009“…The target was to develop models which mimic the actual cutting process using the Finite Element Method (FEM) and to validate the developed tool path strategy algorithm with the actual machining process and to programmer the developed algorithm into software. …”
Get full text
Get full text
Conference or Workshop Item -
18
Performance of Semi Active Lateral Control (SALC) algorithm for semi active suspension system in multibody co-simulation method / M. M. Abdul Majid ...[et al.]
Published 2018“…The experimental data used for simulation model correlation and validation. New controller algorithm (SALC) was than developed in Matlab/Simulink and integrate with correlated vehicle plant model for handling performance validation against passive suspension and Skyhook. …”
Get full text
Get full text
Article -
19
Performance analysis of machine learning algorithms for classification of infection severity levels on rubber leaves
Published 2023“…This work shows that the spectroscopic measurement combined with classification techniques are promising strategy to classify severity level of WRD based on the spectral data of the rubber leaves.…”
Get full text
Get full text
Get full text
Book Section -
20
A deep reinforcement learning hybrid algorithm for the computational discovery and characterization of small proteins utilizing mycobacterium tuberculosis as a model
Published 2025“…While the focus was on comparing standalone and hybrid models, the study identifies opportunities for future benchmarking against external tools to further validate its contributions. …”
Get full text
Get full text
Thesis
