Search Results - (( a constructive method algorithm ) OR ( rate evaluation method algorithm ))
Search alternatives:
- evaluation method »
- method algorithm »
- rate evaluation »
- a constructive »
-
1
Whole brain radiation therapy verification using 2D gamma analysis method
Published 2020“…The CC algorithm gave the passing rate of 87.25% using 3 mm/3% (DTA/DD) method than PB algorithm with 79.95%. …”
Get full text
Get full text
Thesis -
2
Non-fiducial based electrocardiogram biometrics with kernel methods
Published 2017“…At classification level, Gaussian multi-class Support Vector Machine (SVM) with the One-Against-All (OAA) approach is proposed to evaluate verification performance rates of the feature extraction algorithms. …”
Get full text
Get full text
Thesis -
3
-
4
Resource scheduling algorithm with load balancing for cloud service provisioning
Published 2019“…The method constructs a Fuzzy-based Multidimensional Resource Scheduling model to obtain resource scheduling efficiency in cloud infrastructure. …”
Get full text
Get full text
Article -
5
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
6
An ensemble method with cost function on churn prediction
Published 2019“…Therefore, this paper aims to achieve higher classification accuracy and at the same time, minimising ensemble classifiers by constructing a new ensemble method based on dimensionality reduction in soft set theory. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Crossover and mutation operators of real coded genetic algorithms for global optimization problems
Published 2016“…The strength of the algorithm lies in the fact that it assists the evolution of a population of individuals who would thrive in the survival of the fittest towards the next generation. …”
Get full text
Get full text
Thesis -
8
Optimal Weighted Learning of PCA and PLS for Multicollinearity Discriminators and Imbalanced Groups in Big Data (S/O: 13224)
“…Next, the weighted and transformed features were used to train Linear Discriminant Function (LDA) and to evaluate the constructed rule. The designed algorithm was structured in k-fold cross-validation in attempt to minimise the biasness of the classification performance, measured using error rate. …”
Get full text
Get full text
Monograph -
9
-
10
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…Preventing DoS at the network or infrastructure level typically depends on implementing an IDS. This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
Get full text
Get full text
Article -
11
Modified quasi-Newton type methods using gradient flow system for solving unconstrained optimization
Published 2016“…We investigate the possible use of control theory, particularly theory on gradient ow system to derive some modified line search and trust region methods for optimization. The implementation of these methods in line search algorithm in their original forms would generate a Newton-type matrix which require inversion of a non-sparse matrix or equivalently solving a linear system in every iteration. …”
Get full text
Get full text
Thesis -
12
Comparison of CPU damage prediction accuracy between certainty factor and forward chaining techniques
Published 2024“…The suggested algorithm yields the mean accuracy of the certainty factor approach in diagnosing computer damage utilizing the constructed system. …”
Get full text
Get full text
Get full text
Article -
13
Classification and prediction analysis for weld bead surface quality using feature extraction and mahalanobis-taguchi system
Published 2025“…The results reveal that while the K-means clustering method outperforms the Variable Bin Width method across several performance metrics, including an accuracy of 86.36% and a high specificity of 94.5%, the method’s recall rate of 50.49% indicates room for improvement in identifying true positives. …”
Get full text
Get full text
Get full text
Article -
14
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…Subsequently, NB+RF, a hybrid classification algorithm is used to distinguish similar and dissimilar content behaviours of a packet. …”
Get full text
Get full text
Thesis -
15
Sound quality classification of wood used for Sarawak traditional musical instrument- Sape / Wong Tee Hao
Published 2024“…Each Sape, crafted by various makers, differs in size, materials, and design, leading to variations in their quality. Despite individual methods employed by Sape makers to assess quality during production, a standardized guideline for quality inspection remains absent. …”
Get full text
Get full text
Get full text
Thesis -
16
Performance evaluation and prediction analysis of a novel catalytic combustion heating technology in an open cold emergency environment / Qin Mingyuan
Published 2024“…Five machine learning algorithms were compared to construct predictive models. …”
Get full text
Get full text
Get full text
Thesis -
17
Analysis of dysgraphic children based on letter position / Zarith Marissa Mustafa
Published 2015“…Another objective is to construct a prototype based on Kohonen (SOM) method to classify children with potential dysgraphia symptom whether it is high, medium or low potential. …”
Get full text
Get full text
Thesis -
18
Performance evaluation on quantized weight for convolutional neural network based object detection
Published 2021“…The system is designed based on the modified You Only Look Once (modified-YOLO) architecture which is constructed with only 7 CNN layers. The grid cell parameter value of the system is varied to evaluate its effectiveness and ability in detecting small size objects upon deployment. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Safe avoidance path detection using multi sensor integration for small unmanned aerial vehicle
Published 2018“…The textured situation gives a high success rate while textureless situation produces acceptable success rate until 60cm distance.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
On the combination of adaptive neuro-fuzzy inference system and deep residual network for improving detection rates on intrusion detection
Published 2022“…To evaluate the performance of the proposed method, the proposed method is realized and evaluated on the benchmark NSL-KDD dataset. …”
Get full text
Get full text
Get full text
Get full text
Article
