Search Results - (( development theory normalization algorithm ) OR ( java pattern classification algorithm ))

Refine Results
  1. 1

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5

    Hardware Simulator for Seizure, Preseizure and Normal Mode Signal Generation in LabVIEW Environment for Research by Qidwai, Uvais, Malik, Aamir Saeed, Shakir, Mohamed, Kamel, Nidal

    Published 2013
    “…Currently numerous theories and model have been developed to associate various findings or in relating EEG patterns to develop a software simulator. …”
    Get full text
    Get full text
    Get full text
    Non-Citation Index Journal
  6. 6
  7. 7
  8. 8

    Novel techniques for enhancement and segmentation of acne vulgaris lesions by Malik, A. S., Humayun, J., Kamel, N., Yap, F. B.-B.

    Published 2013
    “…Methods: For the first objective, an algorithm is developed based on the theory of high dynamic range (HDR) images. …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  9. 9
  10. 10

    Ranking trapezoidal fuzzy numbers based on set theoretic indices with Hurwicz criterion / Nazirah Ramli by Ramli, Nazirah

    Published 2003
    “…This study investigates on the development of the NRI and based on that, two observations and three algorithms are created. …”
    Get full text
    Get full text
    Book Section
  11. 11

    Fuzzy state space modeling for solving inverse problems in multivariable dynamic systems by Ismail, Razidah

    Published 2005
    “…To facilitate the implementation of these algorithms, a semi-automated computational tool using Matlab® programming facilities is developed. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Integrated face detection approach for far image application by Salka, Tanko Daniel

    Published 2016
    “…In the proposed illumination compensation method, the R, G and B components were normalized using Gray World Theory (GWT), a theory that compensates the illumination effect. …”
    Get full text
    Get full text
    Thesis
  13. 13

    An adaptive trajectory tracking control of four rotor hover vehicle using extended normalized radial basis function network by ul Amin, Rooh, Aijun, Li, Khan, Muhammad Umer, Shamshirband, Shahaboddin, Kamsin, Amirrudin

    Published 2017
    “…The adaptive weight update based on the Levenberg-Marquardt algorithm is used to avoid weight drift in case the system is exposed to external disturbances. …”
    Get full text
    Get full text
    Article
  14. 14

    An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs by Sadiq, Ali Safaa, Alkazemi, Basem, Mirjalili, Seyedali, Ahmed, Noraziah, Khan, Suleman, Ali, Ihsan, Pathan, Al-Sakib Khan, Ghafoor, Kayhan Zrar

    Published 2018
    “…Our developed algorithm works in extracting the most relevant features that can assist in accurately detecting the network attacks. …”
    Get full text
    Get full text
    Article
  15. 15

    An efficient IDS using hybrid Magnetic swarm optimization in WANETs by Sadiq, Ali Safa, Alkazemi, Basem Y., Mirjalili, Seyedali, Noraziah, Ahmad, Khan, Suleman, Ihsan, Ali, Pathan, Al-Sakib Khan, Ghafoor, Kayhan Zrar

    Published 2018
    “…Our developed algorithm works in extracting the most relevant features that can assist in accurately detecting the network attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    The new efficient and accurate attribute-oriented clustering algorithms for categorical data by Qin, Hongwu

    Published 2012
    “…IG-ANMI algorithm improves G-ANMI by developing a new attribute-oriented initialization method in which part of initial chromosomes is generated by using the attributes partitions. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Inferring functional dependencies for XML storage by Ahmad, Kamsuriah, Ibrahim, Hamidah

    Published 2009
    “…This is in contrast to relational data for which the normalized theory has been developed for eliminating data redundancy. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Space vehicles dynamics and control by Mohammad Abdelrahman, Mohammad Ibraheem

    Published 2011
    “…In both modes the active magnetic control algorithms have been introduced and developed. In detumbling mode the well known minus bdot control law has been modified based upon damping the angular velocity component normal to the magnetic field direction. …”
    Get full text
    Get full text
    Get full text
    Book
  20. 20

    Improved abnormal detection using self-adaptive social force model for visual surveillance by Wan Nur Azhani, W. Samsudin

    Published 2017
    “…For both indoor and outdoor scene, the proposed algorithm outperforms the other methods with accuracy 97% and 100%. …”
    Get full text
    Get full text
    Thesis