Search Results - (( developing imperative selection algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing imperative »
- imperative selection »
- selection algorithm »
- implication based »
- java implication »
-
1
Two-stage feature selection using ranking self-adaptive differential evolution algorithm for recognition of acceleration activity
Published 2018“…Consequently, this paper proposes a ranking self-adaptive differential evolution (rsaDE) feature selection algorithm. The proposed algorithm is capable of selecting the optimal feature subsets while improving the recognition of acceleration activity using a minimum number of features. …”
Get full text
Get full text
Get full text
Article -
2
Implication of image processing algorithm in remote sensing and GIS applications
Published 2011“…The traditional ways of solving the problems, have been replaced, by several new algorithms. The selection of an appropriate algorithm for any given chore is an imperative issue because different algorithms are based on the different concepts. …”
Get full text
Get full text
Get full text
Article -
3
Enhancement of Single and Composite Images Based on Contourlet Transform Approach
Published 2009“…Image enhancement is an imperative step in almost every image processing algorithms. …”
Get full text
Get full text
Thesis -
4
-
5
Modelling of optimized hybrid debris flow using airborne laser scanning data in Malaysia
Published 2019“…Cuckoo search), and evaluator or model inducing algorithms (e.g SVM) were utilized for feature subset selection, which further compared to select the optimal conditioning factors subset. …”
Get full text
Get full text
Thesis -
6
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
7
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
Published 2016“…To preserve the correct functioning of the entire SDN architecture, an efficient detection of various distributed coordinated attacks and anomalies triggered by large-scale malicious events that predominantly target the control plane is of paramount concern and an increasingly important research topic. As a result, developing an efficient controller-agnostic network intrusion-detection method is imperative. …”
Get full text
Get full text
Thesis
