Search Results - (( based classification techniques algorithm ) OR ( program implementation using algorithm ))
Search alternatives:
- program implementation »
- based classification »
- implementation using »
- using algorithm »
- techniques »
-
1
Case Slicing Technique for Feature Selection
Published 2004“…Case Slicing Technique (CST) helps in identifying the subset of features used in computing the similarity measures needed by classification algorithms. …”
Get full text
Get full text
Thesis -
2
Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi
Published 2017“…The second one is to develop prototype for classification of credit cardholder behavior based on k Nearest Neighbors Algorithm. …”
Get full text
Get full text
Thesis -
3
Predicting Student Performance in Object Oriented Programming Using Decision Tree : A Case at Kolej Poly-Tech Mara, Kuantan
Published 2013“…The objective was to identify and implement the most accurate algorithm for the KPTM dataset and to come up with a good prediction model using decision tree technique. …”
Get full text
Get full text
Conference or Workshop Item -
4
Use of hybrid classification algorithm for land use and land cover analysis in data scarce environment
Published 2013“…In conclusion, hybrid classification as a combination of k-means and support vector machine algorithms and post-classification comparison change detection technique can be used to monitor land cover changes in Halabja city, Iraq. …”
Get full text
Get full text
Thesis -
5
-
6
Fpga-Based Accelerator For The Identification Of Finger Vein Pattern Via K-Nearest Centroid Neighbors
Published 2016“…As almost all finger vein recognition algorithms were implemented using software such as MATLAB which is based on general-purpose processor, the processing speed become the bottleneck of the development of finger vein recognition. …”
Get full text
Get full text
Thesis -
7
Raspberry Pi-Based Finger Vein Recognition System Using PCANet
Published 2018“…Factors which impact PCANet are studied to identify the limitations of PCANet. For classification, k-Nearest Neighbours (kNN) with Euclidean distance algorithm is implemented. …”
Get full text
Get full text
Monograph -
8
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. …”
Get full text
Get full text
Thesis -
9
Banana recognition system using convolutional neural network / Mohamad Shafiq Rosli
Published 2021“…The programming is a subject that are used by developer to provide the system. …”
Get full text
Get full text
Thesis -
10
Spiking Neural Network For Energy Efficient Learning And Recognition
Published 2020“…Common building blocks and techniques used to implement a spiking neural network are investigated to identify design parameters for hardware-based neuron implementations. …”
Get full text
Get full text
Get full text
Article -
11
A stylometry approach for blind linguistic steganalysis model against translation-based steganography
Published 2023“…However, accuracy of blind steganalysis algorithms highly depend on the features selected from the input data especially when attacking embedding techniques in TBS. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Implementation of Hybrid Indexing, Clustering and Classification Methods to Enhance Rural Development Programme in South Sulawesi
Published 2024“…The classification technique using the CSLI-Cluster, DVI, and HDI criteria showed that as many as 22 villages had the status of Less Development level, and 8 villages were declared Developed. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Chili crop segregation system design and development strategies
Published 2021“…The image data taken from chili samples can be trained by using Learning Algorithm in the MATLAB program. The performance of the trained network then can be evaluated by using the Confusion Matrix technique. …”
Get full text
Get full text
Get full text
Article -
14
Feature clustering for pso-based feature construction on high-dimensional data
Published 2019“…The Redundancy-Based Feature Clustering (RFC) algorithm was applied to choose the most informative features from the original data, while PSO was used to construct new features from those selected by RFC. …”
Get full text
Get full text
Get full text
Article -
15
Exploring frogeye leaf spot disease severity in soybean through hyperspectral data analysis and machine learning with Orange Data Mining
Published 2025“…Furthermore, reliefF-Gradient boosting and random forest algorithms achieved promising overall accuracy of 97.4% and 96.9%, respectively after implementing filtering and feature selection techniques. …”
Get full text
Get full text
Get full text
Article -
16
Development of deep learning based user-friendly interface for fruit quality detection
Published 2024“…The implementation of deep learning algorithms has contributed to various applications related to the detection of fruit quality. …”
Get full text
Get full text
Get full text
Article -
17
An enhancement of classification technique based on rough set theory for intrusion detection system application
Published 2019“…Thus, to deal with huge dataset, data mining technique can be improved by introducing discretization algorithm to increase classification performance. …”
Get full text
Get full text
Thesis -
18
An adaptive ant colony optimization algorithm for rule-based classification
Published 2020“…The algorithm’s performance was compared with other variants of Ant-Miner and state-of-the-art rules-based classification algorithms based on classification accuracy and model complexity. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
-
20
An enhanced feature selection technique for classification of group based holy Quran verses
Published 2018“…Therefore, in this study, a hybrid feature selection technique is proposed. The proposed FS technique is a combination of filter-based information gain (IG) and wrapper-based CFS algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis
