Search alternatives:
fact research » pain research (Expand Search)
Showing 61 - 80 results of 120 for search '(( fact research random tree algorithm ) OR (( fast OR east) research random three algorithm ))', query time: 0.22s Refine Results
  1. 61
  2. 62
  3. 63
  4. 64
  5. 65

    The coverage method of unmanned aerial vehicle mounted base station sensor network based on relative distance by Taifei Zhao, Hua Wang, Qianwen Ma

    Published 2020-05-01
    “…The simulation results show that the coverage of the proposed algorithm is 22.4% higher than that of random deployment, and it is 9.9%, 4.7% and 2.1% higher than similar virtual force-oriented node, circular binary segmentation and hybrid local virtual force algorithms.…”
    Get full text
    Article
  6. 66
  7. 67
  8. 68
  9. 69
  10. 70
  11. 71
  12. 72

    Enhancing Software Defect Prediction Using Ensemble Techniques and Diverse Machine Learning Paradigms by Ayesha Siddika, Momotaz Begum, Fahmid Al Farid, Jia Uddin, Hezerul Abdul Karim

    Published 2025-07-01
    “…The prediction of software defects is a crucial element in maintaining the stability and reliability of software systems. This research addresses this need by combining advanced techniques (ensemble techniques) with seventeen machine learning algorithms for predicting software defects, categorised into three types: semi-supervised, self-supervised, and supervised. …”
    Get full text
    Article
  13. 73
  14. 74

    Improving Attack Detection in IoV with Class Balancing and Feature Selection by Thierry Widyatama, Ifan Rizqa, Fauzi Adi Rafrastara

    Published 2025-03-01
    “…The ensemble algorithms evaluated in this research comprise Random Forest, Gradient Boosting, and XGBoost. …”
    Get full text
    Article
  15. 75

    Advancing malware imagery classification with explainable deep learning: A state-of-the-art approach using SHAP, LIME and Grad-CAM. by Sadia Nazim, Muhammad Mansoor Alam, Syed Safdar Rizvi, Jawahir Che Mustapha, Syed Shujaa Hussain, Mazliham Mohd Suud

    Published 2025-01-01
    “…The trust of users in the models used for cybersecurity would be undermined by the ambiguous and indefinable nature of existing AI-based methods, specifically in light of the more complicated and diverse nature of cyberattacks in modern times. The present research addresses the comparative analysis of an ensemble deep neural network (DNNW) with different ensemble techniques like RUSBoost, Random Forest, Subspace, AdaBoost, and BagTree for the best prediction against imagery malware data. …”
    Get full text
    Article
  16. 76
  17. 77
  18. 78
  19. 79
  20. 80

    Combined L-Band Polarimetric SAR and GPR Data to Develop Models for Leak Detection in the Water Pipeline Networks by Yuyao Zhang, Hongliang Guan, Fuzhou Duan

    Published 2025-04-01
    “…The model features are selected with the Boruta wrapper algorithm based on the SAOCOM-1A images after pre-processing, and the SSRDC values at sampling locations within the research area are calculated with the reflected wave method based on the GPR data. …”
    Get full text
    Article