Search Results - (( _ implementation function algorithm ) OR ( code classification issues algorithm ))
Search alternatives:
- implementation function »
- classification issues »
- code classification »
- function algorithm »
- issues algorithm »
-
1
Development of a modified adaptive protection scheme using machine learning technique for fault classification in renewable energy penetrated transmission line
Published 2020“…The high-cost of implementations, cyber-attack, and latency concerns from the adopted communication channels for the standard APS relay characteristic setting and selection is another drawback identified. …”
Get full text
Get full text
Thesis -
2
-
3
Crow Search Freeman Chain Code (CS-FCC) feature extraction algorithm for handwritten character recognition
Published 2023“…With so many algorithms developed to improve classification accuracy, interest in feature extraction in Handwritten Character Recognition (HCR) has increased. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
-
5
-
6
Automatic multilevel medical image annotation and retrieval
Published 2008“…To address third issue, automatic multilevel code generation is proposed for image classification and multilevel image annotation. …”
Get full text
Get full text
Article -
7
Genetic algorithm fuzzy logic for medical knowledge-based pattern classification
Published 2023Article -
8
Phishing image spam classification research trends: Survey and open issues
Published 2020Get full text
Get full text
Article -
9
-
10
A multilayered convolutional sparse coding framework for modeling of pooling operation of convolution neural networks
Published 2019“…The multilayered version of CSC(ML-CSC) is shown to be connected to forward pass of CNNs and dictionary learning and sparse coding algorithms of this model are analyzed for solving classification and inverse problems in image processing. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
Improving hand written digit recognition using hybrid feature selection algorithm
Published 2022“…While mRMR was capable of identifying a subset of features that were highly relevant to the targeted classification variable, it still carry the weakness of capturing redundant features along with the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Deep learning based emotion recognition for image and video signals: matlab implementation
Published 2021“…This book is carried out to develop an image and video-based emotion recognition model using CNN for automatic feature extraction and classification with Matlab sample codes. Five emotions are considered for recognition: angry, happy, neutral, sad, and surprise, compared to previous algorithms. …”
Get full text
Get full text
Book -
13
-
14
-
15
Design and implementation of MD5 hash function algorithm using verilog HDL
Published 2022“…Among hash algorithms, MD5 is the most used hash function algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
A-star (A*) algorithm implementation for robotics path planning navigation
Published 2018“…This thesis is about the implementation of Astar (A*) algorithm as path planning algorithm used in robotics navigation. …”
Get full text
Get full text
Undergraduates Project Papers -
17
Design and Implementation of MDS Hash Function Algorithm Using Verilog HDL
Published 2020“…Among hash algorithms, MD5 is the most used hash function algorithm. …”
Get full text
Get full text
Get full text
Article -
18
Comparative implementation of the benchmark Dejong 5 function using flower pollination algorithm and the African buffalo optimization
Published 2019“…This communication presents experimental research findings on the application of the flower pollination algorithm (FPA) and the African buffalo optimization (ABO) to implement the complex and fairly popular benchmark Dejong 5 function. …”
Get full text
Get full text
Get full text
Article -
19
-
20
DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE
Published 2019“…This project used iterative method to investigate the security algorithm and implemented the algorithm. Besides that, iterative methods also used to improve the frequency, power and are requirements performance of RIPEMD-160 hash function. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD
