Search Results - (( developing unique detection algorithm ) OR ( java classification problem algorithm ))
Search alternatives:
- classification problem »
- java classification »
- developing unique »
- problem algorithm »
- unique detection »
-
1
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…Increase of hearth problem in this world is rising each day. Classification system for heart disease is a system that able to justify whether a patient has heart problem or not. …”
Get full text
Get full text
Thesis -
2
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
3
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Feature subset selection and classifier ensemble learning are familiar techniques with high ability to optimize above problems. Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
4
Drone Based People Counter And Tracking Using Unique Id Using Opencv Python
Published 2020Get full text
Get full text
Monograph -
5
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
6
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…So, the integration of Artificial Neural Network (ANN) with an Expert System for material classification was explored. The computational tool, Matlab was proposed for classification with Levenberg-Marquardt training algorithm, which provided faster rate of convergence for feed forward network. …”
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Object-Oriented Programming semantics representation utilizing agents
Published 2011“…Generally, these source codes go through the preprocessing, comparison, extraction, generate program semantics and classification processes. A formal algorithm that can be applied to any two related Java-based source codes examples is invented to generate the semantics of these source codes. …”
Get full text
Get full text
Get full text
Article -
9
Investigation And Development Of Flattening Algorithms For Curved Latent Fingerprint Images
Published 2015“…Algorithm that applies ellipse approximation provides better performance as compared with the algorithm that developed based on parabolic approximation. …”
Get full text
Get full text
Thesis -
10
Development of a user-adaptable human fall detection based on fall risk levels using depth sensor
Published 2018“…The inclusion of the fall risk level identification, further enhanced and improved the accuracy of the fall detection. The experimental results showed promising performance in adapting the algorithm for people with different fall risk levels for fall detection.…”
Get full text
Get full text
Get full text
Article -
11
Development of a user-adaptable human fall detection based on fall risk levels using depth sensor
Published 2018“…The inclusion of the fall risk level identification, further enhanced and improved the accuracy of the fall detection. The experimental results showed promising performance in adapting the algorithm for people with different fall risk levels for fall detection.…”
Get full text
Get full text
Get full text
Article -
12
Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms
Published 2016“…The latest effort to solve this selection problem is the development of the metrics selection model that uses genetic algorithm (GA). …”
Get full text
Get full text
Thesis -
13
Pengesanan minutiae imej cap jari berskala kelabu menggunakan algoritma susuran batas
Published 2002“…Even though, Wse minutiae still detected during the process. Based on these errors, an improved Ridge Line Following Algorithm has developed which consist of five processes; tangent direction computation, sectioning and maximum determination, end point detection, bifurcation point detection, and post-processing. …”
Get full text
Get full text
Thesis -
14
Classification and detection of intelligent house resident activities using multiagent
Published 2013“…Result shows that, the algorithm can successfully identify 135 unique tasks of different lengths.This algorithm is surely being an alternate way of pattern recognition in intelligent home.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…It consists of 3-stage procedures: feature ranking, feature selection and classification. Subsequently, an experimental evaluation of the proposed Multi-Filter Feature Selection (M2FS) method is performed by using the benchmark dataset, NSL-KDD and employed the J48 classification algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Forgery detection in medical images using Complex Valued Neural Network (CVNN)
Published 2011“…Ability of the algorithm to localize modification undergone makes it a unique and efficient algorithm for authentication and tamper detection as well as blind detection applications.…”
Get full text
Get full text
Get full text
Article -
17
Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method
Published 2020“…The first authentication method is the Luhn checksum algorithm, otherwise called Luhn formula or mod 10 algorithm. …”
Get full text
Get full text
Journal -
18
Micro-Crack Detection Of Solar Cells Featuring Adaptive Anisotropic Diffusion Filter And Semi-Supervised Support Vector Learning
Published 2014“…These properties together with the shape feature of the micro-crack are used in developing the detection algorithm. In this work, an image processing algorithm featuring an adaptive anisotropic diffusion filter and a segmentation technique based on twostage thresholding is proposed. …”
Get full text
Get full text
Thesis -
19
Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions
Published 2016“…Interestingly, the experimental results under different irradiances also show that the proposed algorithm can detect the GMPP faster in comparison with other methods. …”
Get full text
Get full text
Thesis -
20
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
Published 2018“…Thus, the optimization of the randomly detectors of V-Detectors algorithm with CSDE is proficient and suitable for anomaly detection tasks.…”
Get full text
Get full text
Get full text
Get full text
Thesis
