Search Results - (( developing state intention algorithm ) OR ( java pattern classification algorithm ))

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Multichannel optimization with hybrid spectral- entropy markers for gender identification enhancement of emotional-based EEGs by Al-Qazzaz, Noor Kamal, Sabir, Mohannad K., Mohd Ali, Sawal Hamid, Ahmad, Siti Anom, Grammer, Karl

    Published 2021
    “…Secondly, it aims to develop an automatic gender recognition model by employing optimization algorithms to identify the most effective channels for gender identification from emotional-based EEG signals. …”
    Get full text
    Get full text
    Article
  6. 6

    A comprehensive analysis of surface electromyography for control of lower limb exoskeleton by Abdelhakim, Deboucha

    Published 2016
    “…Results showed that the filter parameters selection could significantly affect the amplitude of the sEMG as well as it may conceal the exact onset/offset time of the signal. The developed algorithm for the crosstalk recordings detection shows ability in determining the presence of the overlapped measurements period. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Cyber hygiene during Covid-19 to avoid cyber attacks by Lee, Yvonne Yi Jin

    Published 2022
    “…Moreover, the Theory of Planned Behavior (TPB) was used in this study to help investigate the relationship between attitude, intentions, and behavior toward cyber hygiene. Five hypotheses were developed in hopes of identifying the relationship between the factors and cyber hygiene behavior. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis