Search Results - (( new evaluation ((tool algorithm) OR (tree algorithm)) ) OR ( _ identification task algorithm ))
Search alternatives:
- identification task »
- _ identification »
- new evaluation »
- tool algorithm »
- tree algorithm »
- task algorithm »
-
1
Detection and classification of conflict flows in SDN using machine learning algorithms
Published 2021“…Using a range flows from 1000 to 100000 with an increment of 10000 flows per step in two network topologies namely, Fat Tree and Simple Tree Topologies, that were created using the Mininet simulator and connected to the Ryu controller, the performance of the proposed algorithms was evaluated for efficiency and effectiveness across a variety of evaluation metrics. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
2
Complex word identification model for lexical simplification in the Malay language for non-native speakers
Published 2023“…This study consists of three modules, i) A Malay CWI dataset, ii) Malay CWI features with the new enhanced stemmer rules, and iii) A CWI model based on the Gradient Boosted Tree (GB) algorithm. …”
Get full text
Get full text
Get full text
Thesis -
3
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
4
-
5
Enhanced dynamic security assessment for power system under normal and fake tripping contingencies.
Published 2019“…The hybrid logistic model tree (hybrid LMT) approach proposed in this study combines the symmetrical uncertainties (SU) algorithm and the logistic model tree (LMT) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Autonomous self-exam monitoring for early diabetes detection
Published 2020“…This project comprises of three stages which are pre-processing, processing and post processing stage. The designed tool convert an iris image into new picture using image processing algorithms and analyses some changes in colour pattern and lastly diagnose whether it is diabetic or non-diabetic iris. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Enhancing a cluster-based TDMA MAC protocol for vehicle-to-vehicle communications / Abubakar Bello Tambawal
Published 2020“…A dynamic time slot allocation strategy using a binary tree algorithm has been proposed to prevent vehicles from the adjacent clusters to reserve the same time slot. …”
Get full text
Get full text
Get full text
Thesis -
8
Electricity distribution network for low and medium voltages based on evolutionary approach optimization
Published 2015“…This thesis proposes an algorithm to find the optimum distribution substation placement and sizing by utilizing the PSO algorithm and optimum feeder routing using modified Minimum Spanning Tree (MST). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The users of the IIoT connected devices should be able to authenticate and communicate even when the Internet connections are intermittent and not available. A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
Get full text
Get full text
Thesis -
10
Oil palm female inflorescences anthesis stages identification using selected emissivities through thermal imaging and Machine Learning
Published 2022“…These tasks are labor-intensive and subjective to the availability of experts. …”
Get full text
Get full text
Get full text
Thesis -
11
Case Slicing Technique for Feature Selection
Published 2004“…This technique with k = 10 has been used in this thesis to evaluate the proposed approach. CST was compared to other selected classification methods based on feature subset selection such as Induction of Decision Tree Algorithm (ID3), Base Learning Algorithm K-Nearest Nighbour Algorithm (k-NN) and NaYve Bay~sA lgorithm (NB). …”
Get full text
Get full text
Thesis -
12
Evaluating the effects of the dual tree complex wavelet transform and the adaptive rood pattern search algorithm on a video codec
Published 2008Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm
Published 2014“…Moreover, cache pollution is a drawback of traditional web caching policies such as Least Frequently Used (LFU), Least Recently Used (LRU), and Greedy Dual Size (GDS) where web objects that are stored in the cache are not visited frequently. In this work, new intelligent cooperative web caching approaches based on decision tree supervised machine learning algorithm are presented. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
A Comparative of Two-Dimensional Statistical Moment Invariants Features in Formulating an Automated Probabilistic Machine Learning Identification Algorithm for Forensic Application
Published 2023“…Theseempiricalresults also conveyed that the superior proposed identification algorithm in this research could be developed as a mobile application for ballistics identification that can significantly reduce the time taken and conveniently perform the ballistics identification tasks.…”
Get full text
Get full text
Get full text
Article -
15
A new multicast-based architecture to support host mobility in IPv6
Published 2003“…The mechanism is based on hash algorithm. This paper explains the construction of a dynamic delivery tree of the mobile node movement for a multicast-based mobile IPv6 network, such that the branches of the tree constitute the shortest paths from the packet source to each of the visited locations. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Feature extraction from natural language to aid requirements reuse in software product lines engineering / Noor Hasrina Bakar
Published 2016“…Then, linguistic tagging is applied to extract software features followed by applying simple clustering algorithms to form groups of common features. In phase 4, the common features that are grouped together are passed to the feature modelling process and manual feature diagram are constructed as the final output. …”
Get full text
Get full text
Thesis -
17
Optimizing tree planting areas through integer programming and improved genetic algorithm
Published 2012“…In addition, the strategy of control mechanism was applied in hybrid algorithm. With the aim of evaluating the algorithm efficiency, comparisons between the proposed strategies and the previous strategies were conducted. …”
Get full text
Get full text
Thesis -
18
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…The algorithm simulates two important tasks that are frequently used by the human experts to identify summarizing strategies used to produce the summary sentences: 1) sentences relevance identification; and 2) summarizing strategies identification. …”
Get full text
Get full text
Thesis -
19
Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji
Published 2018“…Then the new rotation angle is used to detect bleeding in the patient and evaluate the performance of the new algorithm. …”
Get full text
Get full text
Thesis -
20
Edge assisted crime prediction and evaluation framework for machine learning algorithms
Published 2022“…In particular, this study proposes a crime prediction and evaluation framework for machine learning algorithms of the network edge. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
