Search Results - (( parameter evaluation path algorithm ) OR ( code classification modelling algorithm ))
Search alternatives:
- classification modelling »
- parameter evaluation »
- code classification »
- modelling algorithm »
- evaluation path »
- path algorithm »
-
1
Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection
Published 2024“…This study develops and analyze using neural network-based models for effective classification of data packets using the DSCP header field. …”
Get full text
Get full text
Get full text
Article -
2
Evaluation of robot path planning algorithms in global static environments: genetic algorithm vs ant colony optimization algorithm / Nohaidda Sariff and Norlida Buniyamin
Published 2010“…Performances between both algorithms were compared and evaluated in terms of speed and number of iterations that each algorithm takes to find an optimal path within several selected environments. …”
Get full text
Get full text
Get full text
Article -
3
A hybrid sampling-based path planning algorithm for mobile robot navigation in unknown environments
Published 2013“…Sampling-based motion planning is a class of randomized path planning algorithms with proven completeness. …”
Get full text
Get full text
Thesis -
4
Cognitive map approach for mobility path optimization using multiple objectives genetic algorithm
Published 2023Subjects:Conference Paper -
5
A multi-objective parametric algorithm for sensor-based navigation in uncharted terrains
Published 2023“…These parameters are designed carefully to cover different requirements of the path planner. …”
Article -
6
-
7
Performance comparison between genetic algorithm and ant colony optimization algorithm for mobile robot path planning in global static environment / Nohaidda Sariff
Published 2011“…Subsequently, both algorithms were applied to the test environments. Finally, the performances of both algorithms were analyzed and evaluated based on the required criteria. …”
Get full text
Get full text
Thesis -
8
An Experiment of Ant Algorithms : Case Study of Kota Kinabalu Central Town
Published 2005“…The objectives of this study are to explore and evaluate the Ant System (AS) algorithm and Ant Colony System (ACS) algorithm in finding shortest paths. …”
Get full text
Get full text
Get full text
Thesis -
9
Performance analysis of ZigBeePRO network using shortest path algorithm for Distributed Renewable Generation
Published 2021“…Due to this polarization effect, the brick-built type cabin at the DRG site is a consequence of a higher propagation path loss than the Iron (III)-made cabin. The other performance parameters, including network throughput, data loss, and ZigBeePRO collision, are also evaluated.…”
Get full text
Get full text
Article -
10
Genetic algorithm fuzzy logic for medical knowledge-based pattern classification
Published 2018“…The proposed algorithm was applied and tested in four critical illness datasets in medical knowledge pattern classification. …”
Get full text
Get full text
Article -
11
Scene classification for aerial images based on CNN using sparse coding technique
Published 2017“…Recent developments include several approaches and numerous algorithms address the task. This article proposes a convolutional neural network (CNN) approach that utilizes sparse coding for scene classification applicable for HRRS unmanned aerial vehicle (UAV) and satellite imagery. …”
Get full text
Get full text
Article -
12
Machine learning-based enhanced deep packet inspection for IP packet priority classification with differentiated services code point for advance network management
Published 2024“…This study presents an approach to enhance intelligent packet forwarding priority classification on Differentiated Services Code Point (DSCP), leveraging classifiers from machine learning algorithms for Deep Packet Inspection (DPI). …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Scene classification for aerial images based on CNN using sparse coding technique
Published 2023Article -
14
An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding
Published 2020“…Current work adopts the Fuzzy c-means Bag of Visual Words model and sparse coding for plant identification. …”
Get full text
Get full text
Get full text
Article -
15
All-pass filtered x least mean square algorithm for narrowband active noise control
Published 2018“…The performance evaluation in terms of convergence speed of the proposed algorithm is validated with standard ANC without secondary path modelling. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Malware Classification and Detection using Variations of Machine Learning Algorithm Models
Published 2025“…The research stage starts from pre-Processing, extraction, feature selection and classification processes and performance testing. Training and testing data in the study used a mixed model, namely data division, split model and cross validation. …”
Get full text
Get full text
Get full text
Article -
17
Object-Oriented Programming semantics representation utilizing agents
Published 2011“…The algorithm requires source codes comparison based on keyword similarity to extract the words that exist in the two related source codes. …”
Get full text
Get full text
Get full text
Article -
18
Genetic algorithm fuzzy logic for medical knowledge-based pattern classification
Published 2023“…The proposed algorithm was applied and tested in four critical illness datasets in medical knowledge pattern classification. …”
Article -
19
Cross-project software defect prediction
Published 2022“…Through this work, it was discovered the majority of the selected studies used machine learning techniques as classification algorithms, and 64% of the studies used the combination of Object-Oriented (OO) and Line of Code (LOC) metrics. …”
Get full text
Get full text
Article -
20
Attack path selection optimization with adaptive genetic algorithms
Published 2016“…It calculates the appropriate adjustments for the control parameters such as selection and crossover rate. Possible attack paths are then identified and evaluated based on an attack graph representing the network under study. …”
Get full text
Get full text
Article
