Search Results - (( moderation classifications based algorithm ) OR ( using function based algorithm ))
Search alternatives:
- moderation classifications »
- classifications based »
- using function »
-
1
Backpropagation vs. radial basis function neural model : Rainfall intensity classification for flood prediction using meteorology data
Published 2016“…Among the various soft computing methods, Artificial Neural Network (ANN) is the most commonly used methodology. While numerous ANN algorithms were applied, the most commonly applied are the Backpropagation (BPN) and Radial Basis Function (RFN) models. …”
Get full text
Get full text
Get full text
Article -
2
Using genetic algorithms to optimise land use suitability
Published 2012“…In this study, under environmentfriendliness objective, based on multi-agent genetic algorithms, was developed a geospatial model for the land use allocation. …”
Get full text
Get full text
Thesis -
3
Diagnostic power of resting-state fMRI for detection of network connectivity in Alzheimer's disease and mild cognitive impairment: a systematic review
Published 2021“…Nevertheless, various concerns over the homogeneity of data based on patient selection, scanner effects, and the variable usage of classifiers and algorithms pose a challenge for ML-based image interpretation of rs-fMRI datasets to become a mainstream option for diagnosing AD and predicting the conversion of HC/MCI to AD.…”
Get full text
Get full text
Get full text
Article -
4
Recommendation System Model For Decision Making in the E-Commerce Application
Published 2024thesis::doctoral thesis -
5
-
6
Performance analysis of machine learning algorithms for classification of infection severity levels on rubber leaves
Published 2023“…This work shows that the spectroscopic measurement combined with classification techniques are promising strategy to classify severity level of WRD based on the spectral data of the rubber leaves.…”
Get full text
Get full text
Get full text
Book Section -
7
Classification of Distracted Male Driver Based on Driving Performance Indicator (DPI)
Published 2024“…Weka is a strong data mining and machine learning program including algorithms for data preparation, classification, regression, clustering, and visualization. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
An intra-severity classification and adaptation technique to improve dysarthric speech recognition accuracy / Bassam Ali Qasem Al-Qatab
Published 2020“…The total improvement of the WER based on severity level were 66.32%, 52.35%, and 45.20% for mild, moderate, and severe severity level respectively for the hybrid MLLR+MAP adaptation technique. …”
Get full text
Get full text
Get full text
Thesis -
9
-
10
Mid-infrared spectroscopy for early detection of basal stem rot disease in oil palm
Published 2014“…The selected principal component scores were used in classification using linear discriminant analysis (LDA), quadratic discriminant analysis (QDA), k-nearest neighbor (kNN) and Naive-Bayes (NB) multivariate classification algorithms. …”
Get full text
Get full text
Article -
11
Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions
Published 2018“…The BOGS-BAT algorithm is based on three techniques. The first technique is to move or switch solution from single function to functions that contain more than one objective functions. …”
Get full text
Get full text
Thesis -
12
A block cipher based on genetic algorithm
Published 2016“…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
Get full text
Get full text
Get full text
Thesis -
13
FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources
Published 2026“…To initialise function placement, Fitness-Based Swap (FBSW) algorithm is proposed which places functions based on pre-defined information such as function size, function maximum execution time, and storage cost. …”
Get full text
Get full text
Get full text
Article -
14
Classification of Mental Health Level of Students Using SMOTE and Soft Voting Ensemble Classifier and the DASS-21 Profile
“…It leverages the Synthetic Minority Over-sampling Technique (SMOTE) to address the class imbalance in the dataset and employs a Voting Ensemble with soft voting to combine several base algorithms (Logistic Regression, Random Forest, Gradient Boosting, and XGBoost/SVM) for accurate prediction of mental health levels (normal, mild, moderate, severe, very severe). …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Diabetic retinopathy detection using fusion of textural and optimized convolutional neural network features / Uzair Ishtiaq
Published 2024“…The hybrid approach based on image preprocessing and fusion of features is the foundation of the proposed classification method. …”
Get full text
Get full text
Get full text
Thesis -
16
Computation of cryptosystem based on Lucas functions using addition chain
Published 2010“…Cryptosystem based on Lucas Functions is known as LUC Cryptosystem. …”
Get full text
Get full text
Conference or Workshop Item -
17
An improved fast scanning algorithm based on distance measure and threshold function in region image segmentation
Published 2016“…Hence, this study proposes an Improved Fast Scanning algorithm that is based on Sorensen distance measure and adaptive threshold function. …”
Get full text
Get full text
Get full text
Thesis -
18
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
Published 2003“…Utilizing the properties of Lucas functions introduced a public key system based on Lucas functions instead of exponentiation, which offer a good alternative to the most publicly used exponential public key system RSA. …”
Get full text
Get full text
Thesis -
19
Image encryption algorithm based on chaotic mapping
Published 2003“…HVT function is based on a two-dimensional chaotic map that utilized Baker’s map algorithm. …”
Get full text
Get full text
Get full text
Article -
20
An efficient computation technique for cryptosystems based on Lucas functions
Published 2008Get full text
Get full text
Conference or Workshop Item
