Showing 461 - 480 results of 2,679 for search 'decision three algorithm.', query time: 0.21s Refine Results
  1. 461
  2. 462
  3. 463
  4. 464
  5. 465
  6. 466
  7. 467

    A Comparative Analysis of Machine Learning Algorithms for Classification of Diabetes Utilizing Confusion Matrix Analysis by Maad M. Mijwil, Mohammad Aljanabi

    Published 2024-05-01
    “…The study determined that three algorithms are very effective at prediction. …”
    Get full text
    Article
  8. 468
  9. 469
  10. 470

    Enhancing Support Vector Classification for Diabetes Prediction with Novel Optimization Algorithms of Intelligent Health Services by Debojani Paul Chowdhury, Aditi Paul Chowdhury, Apurba Das, Pinki Pinki

    Published 2025-06-01
    “…Additionally, 3 novel metaheuristic algorithms, Quadratic Interpolation Optimizer (QIO), Tunicate Swarm Algorithm (TSA), and African Vulture Optimization Algorithm (AVOA) were utilized to enhance the SVC’s performance. …”
    Get full text
    Article
  11. 471
  12. 472
  13. 473

    Investigating the performance of random oversampling and genetic algorithm integration in meteorological drought forecasting with machine learning by Tahsin Baykal, Özlem Terzi, Gülsün Yıldırım, Emine Dilek Taylan

    Published 2025-05-01
    “…Therefore, this study aims to evaluate the effectiveness of machine learning methods for meteorological drought estimation and to integrate Random Oversampling (ROS) and Genetic Algorithm (GA) methods to improve estimation accuracy. …”
    Get full text
    Article
  14. 474
  15. 475
  16. 476
  17. 477

    Design of a dynamic trust management and defense decision system for shared vehicle data based on blockchain and deep reinforcement learning by Jinxiang Chen, Yan Li, Jiaxing Deng, Beicheng Qin, Chengcai He, Qiangsheng Huang, Jingchun Wu

    Published 2025-07-01
    “…The DQN-based system achieves a performance increase exceeding 20% compared to Q-learning, highlighting its decision-making efficacy. (3) Malicious Behavior Detection Rate: Measures the system’s ability to detect and address malicious activities. …”
    Get full text
    Article
  18. 478
  19. 479
  20. 480