Search Results - (( software evaluation method algorithm ) OR ( using optimization learning algorithm ))
Search alternatives:
- optimization learning »
- learning algorithm »
- evaluation method »
- method algorithm »
-
1
Successor selection for Ant Colony Optimization technique algorithm / Muhammad Iskandar Isman
Published 2017“…Therefore, in this research, will be use Ant Colony Optimization (ACO) algorithm as an optimize technique that provide a shortest path of defining a successor that is their highest value of criteria. …”
Get full text
Get full text
Thesis -
2
Software defect prediction framework based on hybrid metaheuristic optimization methods
Published 2015“…The classification algorithm is a popular machine learning approach for software defect prediction. …”
Get full text
Get full text
Get full text
Thesis -
3
Enhancing three variants of harmony search algorithm for continuous optimization problems
Published 2021“…Meanwhile, opposition-based learning (OBL), is an effective technique used to improve the performance of different optimization algorithms, including HS. …”
Get full text
Get full text
Get full text
Article -
4
-
5
Comparison of Logistic Regression, Random Forest, SVM, KNN Algorithm for Water Quality Classification Based on Contaminant Parameters
Published 2024“…This research provides new insights into the application of machine learning algorithms for water quality management as well as guidance for optimal algorithm selection.…”
Get full text
Get full text
Get full text
Get full text
Article -
6
Edge assisted crime prediction and evaluation framework for machine learning algorithms
Published 2022“…To anticipate occurrences, ML methods such as Decision Trees, Neural Networks, K-Nearest Neighbors, and Impact Learning are being utilized, and their performance is compared based on the data processing and modification used. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
An enhanced version of black hole algorithm via levy flight for optimization and data clustering problems
Published 2019“…Recently, nature-inspired algorithms have been proposed and utilized for solving the optimization problems in general, and data clustering problem in particular. …”
Get full text
Get full text
Get full text
Article -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
9
A selective approach for energy-aware video content adaptation decision-taking engine in android based smartphone
Published 2019“…The EnVADE algorithm uses selective mechanism. Selective mechanism means the video segmented into scenes and adaptation process is done based on the selected scenes. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Automatic Segmentation and Classification of Skin Lesions in Dermoscopic Images
Published 2024“…In the third classification algorithm, hybrid features are extracted using AlexNet and VGG-16 through a transfer learning approach where parameter manipulation is implemented to simplify the network. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…The results are used to develop the hybrid learning algorithm based on the AdaBoost, Bagging, and RUSBoost methods to predict the damage in the tower based on dynamic frequency domain. …”
Get full text
Get full text
Thesis -
12
A COLLABORATIVE FRAMEWORK FOR ANDROID MALWARE IDENTIFICATION USING DYNAMIC ANALYSIS
Published 2019“…The proposed project achieves overall accuracy level of 96.67% using Sequential Minimal Optimization classifier.…”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
13
Software module clustering: An in-depth literature analysis
Published 2022“…Software module clustering is an unsupervised learning method used to cluster software entities (e.g., classes, modules, or files) with similar features. …”
Get full text
Get full text
Get full text
Article -
14
Radiomics analysis and supervised machine learning model for classification of cervical cancer images using diffusion weighted imaging-MRI
Published 2024“…Additionally, the SVM algorithm was evaluated based on its performance across different DWI bvalues, aiming to optimize scanning time. …”
Get full text
Get full text
Get full text
Thesis -
15
Comparative Analysis of Pneumonia Detection from Chest X-Ray Images Using CNN And Transfer Learning
Published 2024“…This research shows which neural network algorithm is optimal for detecting pneumonia, and how medical practitioners might use it in the actual world. …”
Get full text
Get full text
Get full text
Article -
16
Smart phone sensor data: Comparative analysis of various classification methods for task of human activity recognition
Published 2018“…Our work has chosen sensor data of six activities such as standing, walking, laying from pre-recorded dataset gathered via smartphone to evaluate the performance of various supervised machine learning algorithms. The results suggest that logistic regression has been an optimal choice based on experiments. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
17
Optimized Decision Forest for Website Phishing Detection
Published 2021“…Nonetheless, given the dynamism of phishing efforts, there is a constant requirement for novel and efficient website phishing detection solutions. In this study, an optimized decision forest (ODF) method for detecting website phishing is proposed ODF involves the use of a genetic algorithm (GA) for the selection of optimal diverse individual trees in a forest to generate an efficient sub-forest. …”
Get full text
Get full text
Article -
18
-
19
Industrial datasets with ICS testbed and attack detection using machine learning techniques
Published 2021“…The performance metrics such as accuracy, precision, recall, F1 score are evaluated and cross validated for different ML algorithms for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
ReSTiNet : An efficient deep learning approach to improve human detection accuracy
Published 2023“…In recent days, Deep Learning has improved human detection technology. Despite modern techniques, there are very few optimal techniques to construct networks with a small size, deep architecture, and fast training time while maintaining accuracy. …”
Get full text
Get full text
Get full text
Article
