Search Results - (( features extraction protocol algorithm ) OR ( java simulation optimization algorithm ))
Search alternatives:
- features extraction »
- protocol algorithm »
- java simulation »
-
1
Automated feature extraction for predicting multiple sclerosis patient disability using brain MRI
Published 2022“…This study aims to predict MS patients' disability using fully automated feature extraction, single MRI scan, single MRI protocols and without patient follow-up. …”
Get full text
Get full text
Article -
2
Automated feature extraction on brain MRI images for predicting multiple sclerosis patient disability
Published 2022“…Furthermore, they were using manual and semi-automated features extraction. Unlike previous studies, this study aims to predict MS patients’ disability by using automated feature extraction, single MRI scan, and single MRI protocol, without patient follow up. …”
Get full text
Get full text
Get full text
Thesis -
3
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article -
4
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
5
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
Get full text
Get full text
Get full text
Monograph -
6
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
Review -
7
-
8
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
9
Internet of Things (IoT) based activity recognition strategies in smart homes: a review
Published 2022“…The obtained data can be subjected to extensive preprocessing and feature extraction tasks before being learned using appropriate machine learning or deep learning algorithms to generate a model capable of managing human activities more effectively. …”
Get full text
Get full text
Article -
10
Proactive Traffic-Adaptive Tuning of Contention Window for Wireless Sensor Network Medium-Access Control Protocol
Published 2009“…Sensor MAC as the very first MAC protocol for WSN has been designed on top of the IEEE 802.11 MAC protocol along with some added features to meet the special requirements of a WSN. …”
Get full text
Get full text
Thesis -
11
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
12
Brain Machine Interface Controlled Robot Chair
Published 2010“…Mu, Beta and Gamma frequency bands related to the motor actions are extracted using customised filters. New features based on time and frequency components of the EEG signals are proposed and tested with classifiers. …”
Get full text
Thesis -
13
Resource management in grid computing using ant colony optimization
Published 2011“…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
14
-
15
EEG-and MRI-based epilepsy source localization using multivariate empirical mode decomposition and inverse solution method
Published 2018“…Since MEMD method is a data-driven method which meets the criteria to be applied for EEG processing, therefore this method was employed to extract EEG epileptic spike features. In the current study, clinical dataset of 20 subjects were used to examine sLORETA andWMN fed by raw EEG signals and MEMD features on each patient’s realistic head model. sLORETA in combination with MEMD feature after eye blink removal proved to be a reliable ESL algorithm with 100% accuracy. …”
Get full text
Get full text
Thesis -
16
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
Get full text
Get full text
Thesis -
17
Classification of acute leukemia using image processing and machine learning techniques / Hayan Tareq Abdul Wahhab
Published 2015“…In total, 601 features were extracted from each blast cell, and its nucleus: 31of these were shape-based features, while 534 were texture-based features and 36 were color-based features. …”
Get full text
Get full text
Thesis -
18
Moving vehicle identification using artificial neural network
Published 2012Get full text
Working Paper -
19
DATDroid : Dynamic Analysis Technique in Android Malware Detection
Published 2020“…The proposed technique consists of three phases, which includes feature extraction, feature selection and classification phases. …”
Get full text
Get full text
Get full text
Article -
20
Secure lightweight client for cloud-based E-Health Model
Published 2023“…This protocol enables the client to transfer its computational operations to a specified proxy server securely. …”
Get full text
Get full text
Get full text
Thesis
