Search Results - (( evolution classification model algorithm ) OR ( java application model algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Classification of Immunosignature Using Random Forests for Cancer Diagnosis by Zarzar, Mouayad, Razak, Eliza, Htike@Muhammad Yusof, Zaw Zaw, Yusof, Faridah

    Published 2015
    “…In this work, we will develop a robust classification model that can be utilized in cancer diagnosis using immunofingerprint data. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4
  5. 5
  6. 6
  7. 7

    Deep learning detector for pests and plant disease recognition by Ileladewa, Oluwatimilehin Adekunle

    Published 2020
    “…Meanwhile, evolution in deep convolutional neural networks for image classification has rapidly improved the accuracy of object detection, classification and system recognition. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8
  9. 9

    Y-type Random 2-satisfiability In Discrete Hopfield Neural Network by Guo, Yueling

    Published 2024
    “…Finally, a new logic mining model namely Y-Type Random 2-Satisfiability Reverse Analysis was proposed, which showed optimal performances in terms of several metrics as compared to the existing classification models. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Class binarization with self-adaptive algorithm to improve human activity recognition by Zainudin, Muhammad Noorazlan Shah

    Published 2018
    “…However, the learning complexity of classification is increased due to the expansion number of learning model. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Digital economy tax compliance model in Malaysia using machine learning approach by Raja Azhan Syah Raja Wahab, Azuraliza Abu Bakar

    Published 2021
    “…The experimental results show that the ensemble method can improve the single classification model’s accuracy with the highest classification accuracy of 87.94% compared to the best single classification model. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Stock market turning points rule-based prediction / Lersak Photong … [et al.] by Photong, Lersak, Sukprasert, Anupong, Boonlua, Sutana, Ampant, Pravi

    Published 2021
    “…Feature selection was used to sort out key features for further classification. News classification into factors affecting stock market turning point was done using Naïve Bayes, Deep Learning, Generalized Linear Model (GLM) and Support Vector Machine (SVM). …”
    Get full text
    Get full text
    Book Section
  14. 14
  15. 15
  16. 16

    Classification with degree of importance of attributes for stock market data mining by Khokhar, Rashid Hafeez, Md. Sap, Mohd. Noor

    Published 2004
    “…The SVM is a training algorithm for learning classification and regression rules from data [7]. …”
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
    Get full text
    Get full text
    Conference or Workshop Item