Search Results - (( using evolution bat algorithm ) OR ( software classification using algorithm ))
Search alternatives:
- software classification »
- classification using »
- using evolution »
- using algorithm »
- evolution bat »
- bat algorithm »
-
1
-
2
Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff
Published 2017“…Basically, the QEEA is based on the Time Domain (TD) and Frequency Domain (FD) scheduling where it is dependent on the QoS requirements to allocate resources. The proposed algorithm is compared against other scheduling algorithms, namely, the Channel and QoS Aware (CQA), Priority Set Scheduler (PSS), Proportional Fair (PF), Maximum Throughput (MT) and Blind Average Throughput (BAT). …”
Get full text
Get full text
Thesis -
3
Software Classification Using Structure-Based Descriptors
Published 2009“…Based on the undertaken experiment, the IBK algorithm is noted to generate the highest classification accuracy (74.8%) compared to several other algorithms provided in the Weka tool. …”
Get full text
Get full text
Get full text
Thesis -
4
Software defect prediction framework based on hybrid metaheuristic optimization methods
Published 2015“…For the purpose of this study, ten classification algorithms have been selected. The selection aims at achieving a balance between established classification algorithms used in software defect prediction. …”
Get full text
Get full text
Get full text
Thesis -
5
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018Get full text
Get full text
Get full text
Undergraduates Project Papers -
6
Jogging activity recognition using k-NN algorithm
Published 2022“…The k-NN algorithm is a simple and easy-to-implement supervised machine learning algorithm that can be used to solve both classification and regression problems. …”
Get full text
Get full text
Get full text
Academic Exercise -
7
GOS: a Genetic OverSampling Algorithm for classification of Quranic verses
Published 2022Get full text
Get full text
Get full text
Proceeding Paper -
8
Enhancing Classification Algorithms with Metaheuristic Technique
Published 2024Get full text
Get full text
Get full text
Article -
9
Using the bees algorithm to optimise a support vector machine for wood defect classification
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Combining object-based classification and data mining algorithm to classify urban surface materials from worldview-2 satellite image
Published 2014“…In this study, Data Mining was performed using C4.5 algorithm to select the appropriate attributes for object-based classification. …”
Get full text
Conference or Workshop Item -
11
-
12
-
13
Cross-project software defect prediction
Published 2022“…In this work, five research questions covering the classification algorithms, dataset, independent variables, performance evaluation metrics used in CPDP studies, and as well as the performance of individual machine learning classification algorithms in predicting software defects across different software projects were addressed accordingly. …”
Get full text
Get full text
Article -
14
-
15
The Potential of a Classification-based Algorithm to Calculate Calories in Real-Time Via Pattern Recognition
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Accuracy assessment of Digital Terrain Model (DTM) Constructed Cloth Simulation Filter (CSF) and Multi Curvature Classification (MCC) algorithm on UAV LiDAR dataset / Mohamad Khair...
Published 2023“…This study aims to evaluate the effectiveness of open-source software algorithms for ground classification in lidar point clouds and the subsequent generation of accurate DTMs. …”
Get full text
Get full text
Student Project -
17
Classification model for water quality using machine learning techniques
Published 2015Get full text
Get full text
Article -
18
-
19
Symmetric Key Size for Different Level of Information Classification
Published 2006“…Therefore confidential information is normally protected by using cryptographic algorithms. In these algorithms, key is an important element since it is one of the parameters that determine the level of security that the algorithms can provide. …”
Get full text
Get full text
Conference or Workshop Item -
20
