Search Results - (( binary classification modified algorithm ) OR ( java detection system algorithm ))
Search alternatives:
- classification modified »
- binary classification »
- system algorithm »
- java detection »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
Get full text
Get full text
Thesis -
2
Binary whale optimization algorithm with logarithmic decreasing time-varying modified sigmoid transfer function for descriptor selection problem
Published 2023“…This work introduced a new Binary Whale Optimization Algorithm, which utilized a novel time-varying modified Sigmoid transfer function with a modified logarithmic decreasing time-varying update strategy to improve the balancing of exploration and exploitation in WOA. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Improved swarm intelligence algorithms with time-varying modified Sigmoid transfer function for Amphetamine-type stimulants drug classification
Published 2022“…The new binary algorithms, BPSO, BGWOA, BWOA, BHHO, and BMRFO algorithms are utilized for solving the descriptors selection problem in supervised Amphetamine-type Stimulants (ATS) drug classification task. …”
Get full text
Get full text
Get full text
Article -
4
EMG Feature Selection And Classification Using A Pbest-Guide Binary Particle Swarm Optimization
Published 2019“…In order to measure the effectiveness of PBPSO, binary particle swarm optimization (BPSO), genetic algorithm (GA), modified binary tree growth algorithm (MBTGA), and binary differential evolution (BDE) were used for performance comparison. …”
Get full text
Get full text
Get full text
Article -
5
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
6
Improving amphetamine-type stimulants drug classification using chaotic-based time-varying binary whale optimization algorithm
Published 2022“…A new chaotic time-varying binary whale optimization algorithm (CBWOATV) is introduced in this paper to optimize the feature selection process in Amphetamine-type Stimulants (ATS) and non-ATS drugs classification. …”
Get full text
Get full text
Get full text
Article -
7
Design Of Feature Selection Methods For Hand Movement Classification Based On Electromyography Signals
Published 2020“…The second method is called the Modified Binary Tree Growth Algorithm (MBTGA) that applies swap, crossover, and mutation operators. …”
Get full text
Get full text
Get full text
Thesis -
8
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…Thus, this study proposes an enhanced binary grey wolf optimiser (EBGWO) algorithm for FS in anomaly detection to overcome the algorithm issues. …”
Get full text
Get full text
Thesis -
9
Study Of EMG Feature Selection For Hand Motions Classification
Published 2019“…Thus, this paper employs two recent feature selection methods namely competitive binary gray wolf optimizer (CBGWO) and modified binary tree growth algorithm (MBTGA) to evaluate the most informative EMG feature subset for efficient classification. …”
Get full text
Get full text
Get full text
Article -
10
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…The experimental results show that the blood vessel detection system has worked well in the ARM platform with the Android OS. …”
Get full text
Get full text
Conference or Workshop Item -
11
Ensemble classification with modified SIFT descriptor for medical image modality
Published 2016Get full text
Get full text
Conference or Workshop Item -
12
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
Get full text
Get full text
Thesis -
13
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
14
Detection and extraction features for signatures images via different techniques
Published 2019Get full text
Get full text
Conference or Workshop Item -
15
Text steganalysis using evolution algorithm approach
Published 2012“…This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic Algorithms Package (JGAP). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
Get full text
Get full text
Thesis -
17
Machine learning approach of predicting Airline flight delay using Naïve Bayes Algorithm / Ahmad Adib Baihaqi Shukri ... [et al.]
Published 2024“…The KNN and SVM algorithms were alsotrained and tested to complete the binary classification of flight delays for benchmarking purposes. …”
Get full text
Get full text
Get full text
Article -
18
Segmentation Assisted Object Distinction For Direct Volume Rendering
Published 2013“…The ray casting architecture is modified to accommodate object membership information generated by a K-means based hybrid segmentation algorithm. …”
Get full text
Get full text
Thesis -
19
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
20
Finger Vein Recognition Using Pattern Map As Feature Extraction
Published 2012“…Since the low contrast finger vein images may contain shading and noise, it is important to precisely preprocess, extract and preserve the vein patterns. Algorithms such as Gabor Filter, Local Line Binary Pattern (LLBP) and Principal Component Analysis (PCA) have been proposed in recent study to extract finger vein features. …”
Get full text
Get full text
Thesis
