Search alternatives:
modeling algorithm » making algorithm (Expand Search)
using algorithm » using algorithms (Expand Search), routing algorithm (Expand Search), fusion algorithm (Expand Search)
data algorithm » data algorithms (Expand Search), update algorithm (Expand Search), atlas algorithm (Expand Search)
data modeling » data modelling (Expand Search), data models (Expand Search)
element data » settlement data (Expand Search), relevant data (Expand Search), movement data (Expand Search)
modeling algorithm » making algorithm (Expand Search)
using algorithm » using algorithms (Expand Search), routing algorithm (Expand Search), fusion algorithm (Expand Search)
data algorithm » data algorithms (Expand Search), update algorithm (Expand Search), atlas algorithm (Expand Search)
data modeling » data modelling (Expand Search), data models (Expand Search)
element data » settlement data (Expand Search), relevant data (Expand Search), movement data (Expand Search)
-
1
-
2
-
3
-
4
Prediction percentage distribution using different algorithms applied in our research.
Published 2025Subjects: -
5
-
6
-
7
-
8
ML algorithms used in this study.
Published 2025“…Six machine learning algorithms, including Random Forest, were applied and their performance was investigated in balanced and unbalanced data sets with respect to binary and multiclass classification scenarios. …”
-
9
-
10
-
11
-
12
-
13
-
14
-
15
-
16
-
17
-
18
Feature selection using Boruta algorithm.
Published 2025“…Feature selection was performed using the Boruta algorithm and model performance was evaluated by comparing accuracy, precision, recall, F1 score, MCC, Cohen’s Kappa and AUROC.…”
-
19
Performance metrics of applied ML models.
Published 2025“…Additionally, traditional intrusion detection methods are not well-suited for the distinct characteristics of IoT devices, resulting in a low accuracy in applying existing anomaly detection methods. In this paper, we incorporate a two-step authentication process, starting with anonymous authentication using a secret ID with Elliptic Curve Cryptography (ECC), followed by an intrusion detection algorithm for users flagged as suspicious activity. …”
-
20
Flowchart of the proposed methodology applied for modeling crop suitability.
Published 2025Subjects: