Search Results - (( binary classification tree algorithm ) OR ( java implementation success algorithm ))

Refine Results
  1. 1

    Design Of Feature Selection Methods For Hand Movement Classification Based On Electromyography Signals by Too, Jing Wei

    Published 2020
    “…In this regard, this thesis proposes five FS methods for efficient EMG signals classification. The first method is the Binary Tree Growth Algorithm (BTGA), which implements a hyperbolic tangent function to convert the Tree Growth Algorithm into the binary version. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    EMG Feature Selection And Classification Using A Pbest-Guide Binary Particle Swarm Optimization by Too, Jing Wei, Tee, Wei Hown, Abdullah, Abdul Rahim, Mohd Saad, Norhashimah

    Published 2019
    “…In order to measure the effectiveness of PBPSO, binary particle swarm optimization (BPSO), genetic algorithm (GA), modified binary tree growth algorithm (MBTGA), and binary differential evolution (BDE) were used for performance comparison. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Study Of EMG Feature Selection For Hand Motions Classification by Abdullah, Abdul Rahim, Mohd Saad, Norhashimah, Too, Jing Wei

    Published 2019
    “…Thus, this paper employs two recent feature selection methods namely competitive binary gray wolf optimizer (CBGWO) and modified binary tree growth algorithm (MBTGA) to evaluate the most informative EMG feature subset for efficient classification. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Formulation of invariants for discrete orthogonal moments and image classification / Pee Chih Yang by Pee, Chih Yang

    Published 2013
    “…Discrete Tchebichef moments are selected as the implementation platform of the proposed algorithms.To evaluate the performance of invariant algorithms, empirical studies have been carried out on large set of binary images which consist of numbers, English letters, symbols, Chinese characters and objects like animals, trees and company logos under noiseless and noisy conditions. …”
    Get full text
    Get full text
    Thesis
  5. 5

    An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA by Bian, Hui

    Published 2025
    “…Traditional machine learning algorithms, such as Decision Trees, Naive Bayes, Random Forest, Random Trees, Multi-Layer Perceptron, and Support Vector Machines, have been extensively applied to address these threats. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Enhanced Adaptive Neuro-Fuzzy Inference System Classification Method for Intrusion Detection by Jia, Liu

    Published 2024
    “…Therefore, this binary tree cannot analyse complex features of mixed attributes and restricts the CART tree's deep-level feature recognition ability. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Bayesian random forests for high-dimensional classification and regression with complete and incomplete microarray data by Oyebayo, Olaniran Ridwan

    Published 2018
    “…These problems were extensively studied within the scope of classification (binary and multi-class) and regression (linear and survival). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project
  11. 11
  12. 12

    An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA by Hui, Bian, Chiew, Kang Leng

    Published 2025
    “…This study investigates the performance of various conventional machine learning algorithms, including decision trees, naive Bayes, naive Bayes trees, random forest, random trees, MLP, and SVM, in detecting network intrusions using binary and multi-classification approaches. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Prediction of cause of death from forensic autopsy reports using text classification techniques: A comparative study by Mujtaba, Ghulam, Shuib, Liyana, Raj, Ram Gopal, Rajandram, Retnagowri, Shaikh, Khairunisa

    Published 2018
    “…Finally, in text classification algorithms, support vector machine classifier outperforms random forest, Naive Bayes, k-nearest neighbor, decision tree, and ensemble-voted classifier. …”
    Get full text
    Get full text
    Article
  15. 15

    Named entity recognition using a new fuzzy support vector machine. by Mansouri, Alireza, Affendy, Lilly Suriani, Mamat, Ali

    Published 2008
    “…The design of our method is a kind of One-Against-All multi classification technique to solve the traditional binary classifier in SVM.…”
    Get full text
    Get full text
    Article
  16. 16

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…The proposed approach is, so far, only implemented and validated on Java-based Web applications, although it can be implemented in other programming languages with slight modifications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Analytical framework for predicting online purchasing behavior in Malaysia using a machine learning approach by Mustakim, Nurul Ain

    Published 2025
    “…The descriptive analysis examines purchasing behavior through correlation and regression analyses, while the predictive model uses decision trees (J48, Random Tree, REPTree), rule-based algorithms (JRip, OneR, PART), and clustering (K-Means) to identify patterns and predict trends. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Multi-label risk diabetes complication prediction model using deep neural network with multi-channel weighted dropout by Dzakiyullah, Nur Rachman

    Published 2025
    “…The study employed two MLC frameworks: Problem Transformation methods (Binary Relevance, Classifier Chains, Label Power Set, and Calibrated Label Ranking) and Algorithm Adaptation. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Cross-site scripting detection based on an enhanced genetic algorithm by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2015
    “…The proposed approach is, so far, only implemented and validated on Java-based Web applications, although it can be implemented in other programming languages with slight modifications. …”
    Get full text
    Get full text
    Conference or Workshop Item