Search Results - (( gender classification problem algorithm ) OR ( java implementation modified algorithm ))
Search alternatives:
- implementation modified »
- classification problem »
- gender classification »
- java implementation »
- problem algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Gender identification using support vector machines
Published 2023“…Support vector machine (SVM) is a popular technique for classification. It is one of the recent methods for statistical learning and also addresses classification and regression problems. …”
text::Thesis -
3
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
4
An improvement of back propagation algorithm using halley third order optimisation method for classification problems
Published 2020“…Back Propagation (BP) has proven to be a robust algorithm for different connectionist learning problems which commonly available for any functional induction that provides a computationally efficient method. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
6
An enhancement of age and gender classification accuracy with hybrid handcrafted and deep features using hierarchical extreme learning machine / Mohammad Javidan Darugar
Published 2020“…Age and gender classification are some of the essential algorithms that have many use cases in our everyday life. …”
Get full text
Get full text
Get full text
Thesis -
7
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
8
Finding an effective classification technique to develop a software team composition model
Published 2017“…Ineffective software team composition has become recognized as a prominent aspect of software project failures.Reports from results extracted from different theoretical personality models have produced contradicting fits, validity challenges, and missing guidance during software development personnel selection.It is also believed that the technique/s used while developing a model can impact the overall results.Thus, this study aims to: 1) discover an effective classification technique to solve the problem, and 2) develop a model for composition of the software development team.The model developed was composed of three predictors: team role, personality types, and gender variables; it also contained one outcome: team performance variable.The techniques used for model development were logistic regression, decision tree, and Rough Sets Theory (RST).Higher prediction accuracy and reduced patte rn complexity were the two parameters forselecting the effective technique.Based on the results, the Johnson Algorithm (JA) of RST appeared to be an effective technique for a team composition model.The study has proposed a set of 24 decision rules for finding effective team members.These rules involve gender classification to highlight the appropriate personality profile for software developers.In the end, this study concludes that selecting an appropriate classification technique is one of the most important factors in developing effective models.…”
Get full text
Get full text
Get full text
Article -
9
Finding an effective classification technique to develop a software team composition model
Published 2018“…Thus, this study aims to (1) discover an effective classification technique to solve the problem and (2) develop a model for composition of the software development team. …”
Get full text
Get full text
Article -
10
Finding an effective classification technique to develop a software team composition model
Published 2018“…Thus, this study aims to (1) discover an effective classification technique to solve the problem and (2) develop a model for composition of the software development team. …”
Get full text
Get full text
Article -
11
-
12
Speaker identification through feature fusion based deep learning / Rashid Jahangir
Published 2021“…In addition, DNN obtained better classification results compared with the other five machine learning algorithms that were recently utilised in speaker recognition. …”
Get full text
Get full text
Thesis -
13
Enhanced extreme learning machine for general regression and classification tasks
Published 2020“…The proposed FASTA-ELM replaces the analytical step usually solved by SVD with an approximate solution through proximal gradient method, which dramatically speeds up the training time and improves the generalization ability in classification task. The performance of FASTA-ELM is evaluated on face gender recognition problem and the result is comparable to other state-of-theart methods, with significantly reduced training time. …”
Get full text
Get full text
Thesis -
14
-
15
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
16
Development of a new robust hybrid automata algorithm based on surface electromyography (SEMG) signal for instrumented wheelchair control
Published 2020“…Open source system such as Arduino has limitation of specifications that makes able to apply nonpattern recognition control methods which is simpler and easier compared to pattern recognition. However, classification accuracy is lower than pattern recognition and it cannot be applied to higher number participants from different background and gender. …”
Get full text
Get full text
Thesis -
17
Human odour detection approach using machine learning
Published 2019“…The unsurpassed framework for learning algorithm to be used for human identification is Levenberg-Marquardt backpropagation learning algorithm. …”
Get full text
Get full text
Get full text
Thesis -
18
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
19
Cognitive load assessment through EEG: a dataset from arithmetic and stroop tasks
Published 2025“…The dataset incorporates EEG signals obtained from 15 subjects, with a gender distribution of 8 females and 7 males, and a mean age of 21.5 years [ 1 ]. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
20
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
Get full text
Get full text
Thesis
