Search Results - (( binary classification modified algorithm ) OR ( java detection using algorithm ))
Search alternatives:
- classification modified »
- binary classification »
- using algorithm »
- java detection »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
Get full text
Get full text
Thesis -
2
Binary whale optimization algorithm with logarithmic decreasing time-varying modified sigmoid transfer function for descriptor selection problem
Published 2023“…This work introduced a new Binary Whale Optimization Algorithm, which utilized a novel time-varying modified Sigmoid transfer function with a modified logarithmic decreasing time-varying update strategy to improve the balancing of exploration and exploitation in WOA. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Improved swarm intelligence algorithms with time-varying modified Sigmoid transfer function for Amphetamine-type stimulants drug classification
Published 2022“…The new binary algorithms, BPSO, BGWOA, BWOA, BHHO, and BMRFO algorithms are utilized for solving the descriptors selection problem in supervised Amphetamine-type Stimulants (ATS) drug classification task. …”
Get full text
Get full text
Get full text
Article -
4
EMG Feature Selection And Classification Using A Pbest-Guide Binary Particle Swarm Optimization
Published 2019“…In order to measure the effectiveness of PBPSO, binary particle swarm optimization (BPSO), genetic algorithm (GA), modified binary tree growth algorithm (MBTGA), and binary differential evolution (BDE) were used for performance comparison. …”
Get full text
Get full text
Get full text
Article -
5
Improving amphetamine-type stimulants drug classification using chaotic-based time-varying binary whale optimization algorithm
Published 2022“…A new chaotic time-varying binary whale optimization algorithm (CBWOATV) is introduced in this paper to optimize the feature selection process in Amphetamine-type Stimulants (ATS) and non-ATS drugs classification. …”
Get full text
Get full text
Get full text
Article -
6
Design Of Feature Selection Methods For Hand Movement Classification Based On Electromyography Signals
Published 2020“…The second method is called the Modified Binary Tree Growth Algorithm (MBTGA) that applies swap, crossover, and mutation operators. …”
Get full text
Get full text
Get full text
Thesis -
7
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…Thus, this study proposes an enhanced binary grey wolf optimiser (EBGWO) algorithm for FS in anomaly detection to overcome the algorithm issues. …”
Get full text
Get full text
Thesis -
8
Study Of EMG Feature Selection For Hand Motions Classification
Published 2019“…Thus, this paper employs two recent feature selection methods namely competitive binary gray wolf optimizer (CBGWO) and modified binary tree growth algorithm (MBTGA) to evaluate the most informative EMG feature subset for efficient classification. …”
Get full text
Get full text
Get full text
Article -
9
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
10
Ensemble classification with modified SIFT descriptor for medical image modality
Published 2016Get full text
Get full text
Conference or Workshop Item -
11
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
12
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Detection and extraction features for signatures images via different techniques
Published 2019Get full text
Get full text
Conference or Workshop Item -
14
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
Get full text
Get full text
Thesis -
15
Machine learning approach of predicting Airline flight delay using Naïve Bayes Algorithm / Ahmad Adib Baihaqi Shukri ... [et al.]
Published 2024“…The KNN and SVM algorithms were alsotrained and tested to complete the binary classification of flight delays for benchmarking purposes. …”
Get full text
Get full text
Get full text
Article -
16
Identification of microcalcification in mammographic images / Noor Azliza Abdul Shauti
Published 2008“…By using this identification, it can simulate in flexible images post processing and analysis in easy image management using Java aplication. …”
Get full text
Get full text
Thesis -
17
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
Get full text
Get full text
Thesis -
18
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article -
19
Text steganalysis using evolution algorithm approach
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis
