Search Results - data distribution ((using algorithm) OR (((learning algorithm) OR (bat algorithm))))
Search alternatives:
- learning algorithm »
- data distribution »
- using algorithm »
- bat algorithm »
-
1
An improved dynamic load balancing for virtualmachines in cloud computing using hybrid bat and bee colony algorithms
Published 2021“…The proposed HBAC algorithm was tested and compared with other stateof-the-art algorithms on 200 to 2000 even tasks by using CloudSim on standard workload format (SWF) data sets file size (200kb and 400kb). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Mapping the distribution of oil palm using Landsat 8 data by comparing machine learning and non-machine learning algorithms
Published 2019“…Hence, the mapping of oil palm distributions via machine learning algorithm was better than that via non-machine learning algorithm.…”
Get full text
Get full text
Get full text
Article -
3
Inference Algorithms in Latent Dirichlet Allocation for Semantic Classification
Published 2018“…However, the problem of learning or inferencing the posterior distribution of the algorithm is trivial. …”
Get full text
Get full text
Article -
4
Inference Algorithms in Latent Dirichlet Allocation for Semantic Classification
Published 2018“…However, the problem of learning or inferencing the posterior distribution of the algorithm is trivial. …”
Get full text
Get full text
Article -
5
Classification of diabetic patients with imbalanced class distribution by using a Cost-Sensitive forest algorithm / Ummi Asyiqin Che Muhammad and Muhammad Hasbullah Mohd Razali
Published 2023“…Although many machine learning algorithms have been developed by researchers, the class imbalanced distribution still makes it challenging for classifiers to properly learn and differentiate between the minority and majority classes. …”
Get full text
Get full text
Book Section -
6
Comparative performance of deep learning and machine learning algorithms on imbalanced handwritten data
Published 2018“…The experiment shows that although the algorithm is stable and suitable for multiple domains, the imbalanced data distribution still manages to affect the outcome of the conventional machine learning algorithms.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
7
Supervised deep learning algorithms for process fault detection and diagnosis under different temporal subsequence length of process data
Published 2025“…Deep learning algorithms were widely used among all the data-driven algorithms. …”
Get full text
Get full text
Get full text
Article -
8
Machine learning in botda fibre sensor for distributed temperature measurement
Published 2023“…An alternative method is proposed, utilizing machine learning algorithms. Therefore, this thesis explores the comparative analysis for BOTDA data processing using the six most suited machine learning algorithms. …”
text::Thesis -
9
Technical job distribution at BSD SHARP service center using combination of naïve Bayes and K-Nearest neighbour
Published 2022“…Meanwhile, k-NN algorithm is used to classify the experimental data. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…To overcome this limitation, the Q-Learning algorithm was proposed by several researchers to minimise randomness. …”
Get full text
Get full text
Get full text
Thesis -
11
Parallel power load abnormalities detection using fast density peak clustering with a hybrid canopy-K-means algorithm
Published 2025“…Parallel power loads anomalies are processed by a fast-density peak clustering technique that capitalizes on the hybrid strengths of Canopy and K-means algorithms all within Apache Mahout's distributed machine-learning environment. …”
Article -
12
Minimizing Classification Errors in Imbalanced Dataset Using Means of Sampling
Published 2023Conference Paper -
13
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…The results show that using dimensionality reduction techniques along with the ML algorithms with a dataset containing high-dimensional data significantly improves the classification results. …”
Get full text
Get full text
Get full text
Article -
14
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…The results show that using dimensionality reduction techniques along with the ML algorithms with a dataset containing high-dimensional data significantly improves the classification results. …”
Get full text
Get full text
Get full text
Article -
15
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…The results show that using dimensionality reduction techniques along with the ML algorithms with a dataset containing high-dimensional data significantly improves the classification results. …”
Get full text
Get full text
Get full text
Article -
16
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…The results show that using dimensionality reduction techniques along with the ML algorithms with a dataset containing high-dimensional data significantly improves the classification results. …”
Get full text
Get full text
Get full text
Article -
17
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2023“…The results show that using dimensionality reduction techniques along with the ML algorithms with a dataset containing high-dimensional data significantly improves the classification results. …”
Get full text
Get full text
Get full text
Article -
18
Classification of JPEG files by using extreme learning machine
Published 2018“…This paper proposes an Extreme Learning Machine (ELM) algorithm to assign a class label of JPEG or Non-JPEG image for files in a continuous series of data clusters. …”
Get full text
Get full text
Article -
19
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis -
20
Distributed Online Averaged One Dependence Estimator (DOAODE) Algorithm for Multi-class Classification of Network Anomaly Detection System
Published 2019“…Therefore, this paper aims to develop an effective and efficient network anomaly detection system by using distributed online averaged one dependence estimator (DOAODE) classification algorithm for multi-class network data to overcome these issues. …”
Get full text
Get full text
Conference or Workshop Item
