Search Results - (( bayesian network selection algorithm ) OR ( java implementation using algorithm ))
Search alternatives:
- implementation using »
- selection algorithm »
- java implementation »
- using algorithm »
-
1
Dynamic Bayesian Networks and Variable Length Genetic Algorithm for Dialogue Act Recognition
Published 2007“…In the initial stage, the dynamic Bayesian networks models are constructed based on a set of lexical cues selected tentatively from the dialogue corpus. …”
Get full text
Get full text
Thesis -
2
Dynamic Bayesian networks and variable length genetic algorithm for designing cue-based model for dialogue act recognition
Published 2010“…The model is, essentially, a dynamic Bayesian network induced from manually annotated dialogue corpus via dynamic Bayesian machine learning algorithms. …”
Get full text
Get full text
Article -
3
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. …”
Get full text
Get full text
Thesis -
4
Bayesian Network Classifiers for Damage Detection in Engineering Material
Published 2007“…The methodology used in the thesis to implement the Bayesian network for the damage detection provides a preliminary analysis used in proposing a novel fea- ture extraction algorithm (f-FFE: the f-folds feature extraction algorithm). …”
Get full text
Get full text
Thesis -
5
Comparative Analysis Using Bayesian Approach To Neural Network Of Translational Initiation Sites In Alternative Polymorphic Contex
Published 2012“…The objectives of this paper are to develop useful algorithms and to build a new classification model for the case study.The first approach of neural network includes training on algorithms of Resilient Backpropagation,Scaled Conjugate Gradient Backpropagation and Levenberg-Marquardt.The outputs are used in comparison with Bayesian Neural Network for efficiency comparison.The results showed that Resilient Backpropagation have the consistency in all measurement but performs less in accuracy.In second approach,the Bayesian Classifier_01 outperforms the Resilient Backpropagation by successfully increasing the overall prediction accuracy by 16.0%.The Bayesian Classifier_02 is built to improve the accuracy by adding new features of chemical properties as selected by the Information Gain Ratio method,and increasing the length of the window sequence to 201.The result shows that the built model successfully increases the accuracy by 96.0%.In comparison,the Bayesian model outperforms Tikole and Sankararamakrishnan (2008) by increasing the sensitivity by 10% and specificity by 26%. …”
Get full text
Get full text
Get full text
Article -
6
Linking Bayesian Network and Intensive Care Units Data: A Glycemic Control Study
Published 2023“…Decision support systems; Forecasting; Intensive care units; Medical informatics; Trees (mathematics); Accurate prediction; Causal Bayesian network; Discretization algorithms; Discretizations; Glycemic control; Intelligent mechanisms; Performance prediction; Variable selection; Bayesian networks…”
Conference Paper -
7
A Naïve-Bayes classifier for damage detection in engineering materials
Published 2007“…A method for feature subset selection has also been introduced too. The method is based on mean and maximum values of the amplitudes of waves after dividing them into folds then grouping them by a clustering algorithm (e.g. k-means algorithm). …”
Get full text
Get full text
Get full text
Article -
8
Towards personalized intensive care decision support using a Bayesian network: A multicenter glycemic control study
Published 2023“…Benchmarking; Decision support systems; Hospital data processing; Intensive care units; Patient treatment; Trees (mathematics); Blood glucose measurements; Classification precision; Discretization algorithms; Discretizations; Glycemic control; Performance prediction; Structure-learning; Variable selection; Bayesian networks…”
Article -
9
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
10
-
11
Features selection for IDS in encrypted traffic using genetic algorithm
Published 2013“…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic.Brute Force attack traffic collected in a client-server model is implemented in proposed method.Our results prove that the most efficient features were selected by proposed method.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Toxic Gas Dispersion Model Based On Neural Pattern Recognition Networks
Published 2022“…Following the best selection of neural network algorithm, BR algorithm is further trained using 50-70% training with 10-28 hidden neurons. …”
Get full text
Get full text
Monograph -
13
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
14
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
15
Logic Programming In Radial Basis Function Neural Networks
Published 2013“…The analysis revealed that performance of particle swarm optimization algorithm and Prey predator algorithm are better to use in training the networks. …”
Get full text
Get full text
Thesis -
16
Features selection for ids in encrypted traffic using genetic algorithm
Published 2013“…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
18
A GNSS-based weather forecasting approach using Nonlinear Auto Regressive Approach with Exogenous Input (NARX)
Published 2018“…Ten GNSS stations from the Malaysia real-time kinematic network (MyRTKnet) were selected. The selected GNSS stations cover Perak states in Malaysia from 1 January to 31 December 2013. …”
Get full text
Get full text
Article -
19
-
20
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item
