Search Results - (( developing imperative selection algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    Two-stage feature selection using ranking self-adaptive differential evolution algorithm for recognition of acceleration activity by Zainudin, Muhammad Noorazlan Shah, Sulaiman, Md. Nasir, Mustapha, Norwati, Perumal, Thinagaran, Mohamed, Raihani

    Published 2018
    “…Consequently, this paper proposes a ranking self-adaptive differential evolution (rsaDE) feature selection algorithm. The proposed algorithm is capable of selecting the optimal feature subsets while improving the recognition of acceleration activity using a minimum number of features. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Implication of image processing algorithm in remote sensing and GIS applications by Pathan, Mubeena, Jusoff, Kamaruzaman, Mohd Sood, Alias, Razali, Yaakob, Qureshi, Barkatullah

    Published 2011
    “…The traditional ways of solving the problems, have been replaced, by several new algorithms. The selection of an appropriate algorithm for any given chore is an imperative issue because different algorithms are based on the different concepts. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Enhancement of Single and Composite Images Based on Contourlet Transform Approach by Melkamu, Hunegnaw Asmare

    Published 2009
    “…Image enhancement is an imperative step in almost every image processing algorithms. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Modelling of optimized hybrid debris flow using airborne laser scanning data in Malaysia by Lay, Usman Salihu

    Published 2019
    “…Cuckoo search), and evaluator or model inducing algorithms (e.g SVM) were utilized for feature subset selection, which further compared to select the optimal conditioning factors subset. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan by Adnan, -

    Published 2016
    “…To preserve the correct functioning of the entire SDN architecture, an efficient detection of various distributed coordinated attacks and anomalies triggered by large-scale malicious events that predominantly target the control plane is of paramount concern and an increasingly important research topic. As a result, developing an efficient controller-agnostic network intrusion-detection method is imperative. …”
    Get full text
    Get full text
    Thesis