Search Results - (( developing affecting detection algorithm ) OR ( java classification problem algorithm ))
Search alternatives:
- classification problem »
- developing affecting »
- affecting detection »
- java classification »
- problem algorithm »
-
1
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…Increase of hearth problem in this world is rising each day. Classification system for heart disease is a system that able to justify whether a patient has heart problem or not. …”
Get full text
Get full text
Thesis -
2
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
3
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Feature subset selection and classifier ensemble learning are familiar techniques with high ability to optimize above problems. Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
4
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
5
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…So, the integration of Artificial Neural Network (ANN) with an Expert System for material classification was explored. The computational tool, Matlab was proposed for classification with Levenberg-Marquardt training algorithm, which provided faster rate of convergence for feed forward network. …”
Get full text
Get full text
Thesis -
6
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
7
Object-Oriented Programming semantics representation utilizing agents
Published 2011“…Generally, these source codes go through the preprocessing, comparison, extraction, generate program semantics and classification processes. A formal algorithm that can be applied to any two related Java-based source codes examples is invented to generate the semantics of these source codes. …”
Get full text
Get full text
Get full text
Article -
8
Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms
Published 2016“…The latest effort to solve this selection problem is the development of the metrics selection model that uses genetic algorithm (GA). …”
Get full text
Get full text
Thesis -
9
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…It consists of 3-stage procedures: feature ranking, feature selection and classification. Subsequently, an experimental evaluation of the proposed Multi-Filter Feature Selection (M2FS) method is performed by using the benchmark dataset, NSL-KDD and employed the J48 classification algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Missing tags detection algorithm for radio frequency identification (RFID) data stream
Published 2019“…Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
-
12
Investigation And Development Of Flattening Algorithms For Curved Latent Fingerprint Images
Published 2015“…Algorithm that applies ellipse approximation provides better performance as compared with the algorithm that developed based on parabolic approximation. …”
Get full text
Get full text
Thesis -
13
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
14
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article -
15
Amplitude independent muscle activity detection algorithm of soft robotic glove system for hemiparesis stroke patients using single sEMG channel
Published 2020“…Many algorithms have been developed in the literature to detect muscle activities; however, most of these algorithms depend on amplitude features in the detection process. …”
Get full text
Get full text
Thesis -
16
Development of automatic pest sampling and detection system for cash crops
Published 2019“…Connected components algorithm was implemented for insect detection and counting. …”
Get full text
Get full text
Thesis -
17
-
18
Minimization of Test Cases and Fault Detection Effectiveness Improvement through Modified Reduction with Selective Redundancy Algorithm
Published 2007“…The results show the algorithm used in this research can reduce the test suite size as well as significantly improve the fault detection effectiveness. …”
Get full text
Get full text
Thesis -
19
Focal and non-focal epilepsy localization: a review
Published 2018“…This study reviews many recently-proposed algorithms for detecting the focal epileptic seizures. …”
Get full text
Get full text
Get full text
Article -
20
Polymorphic malware detection based on dynamic analysis and supervised machine learning / Nur Syuhada Selamat
Published 2021“…It also caused many protections are developed to fight the malware. The most common method of detecting malware relies on signature-based detection. …”
Get full text
Get full text
Thesis
