Search Results - (( generation classifications modified algorithm ) OR ( java implementation level algorithm ))
Search alternatives:
- generation classifications »
- classifications modified »
- implementation level »
- java implementation »
- level algorithm »
-
1
Modified word representation vector based scalar weight for contextual text classification
Published 2024“…To validate this algorithm, the modified word vectors are compared with original LLM-generated word vectors to evaluate their reflection of the intended context. …”
Get full text
Get full text
Thesis -
2
A hybrid-based modified adaptive fuzzy inference engine for pattern classification
Published 2011“…A modified Apriori algorithm technique is utilized to reduce a minimal set of decision rules based on input output data set. …”
Get full text
Get full text
Conference or Workshop Item -
3
The Bacterial Foraging Optimisation Algorithm using Prototype Selection and Prototype Generation for Data Classification
Published 2020“…However, none of the available works had proposed BFOA as a classification algorithm despite of its good performance. …”
Get full text
Get full text
Get full text
Thesis -
4
Functional link neural network with modified bee-firefly learning algorithm for classification task
Published 2016“…This work proposed the implementation of modified Artificial Bee Colony with Firefly algorithm for training the FLNN network to overcome the drawback of BP-learning algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Modified anfis architecture with less computational complexities for classification problems
Published 2018“…The results show that the proposed modified ANFIS architecture with gaussian membership function and Artificial Bee Colony (ABC) optimization algorithm, on average has achieved classification accuracy of 99.5% with 83% less computational complexity.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
7
MODIFIED AIS-BASED CLASSIFIER FOR MUSIC GENRE CLASSIFICATION
Published 2010“…The discussion will detail out the MIC procedures applied and the modified part in solving the classification problem. …”
Get full text
Get full text
Conference or Workshop Item -
8
A Hybrid Rough Sets K-Means Vector Quantization Model For Neural Networks Based Arabic Speech Recognition
Published 2002“…In this thesis rough sets approach was used in the preprocessing stages, namely in the vector quantization operation in which feature vectors are quantized or classified to a finite set of codebook classes. Classification rules were generated from training feature vectors set, and a modified form of the standard voter classification algorithm, that use the rough sets generated rules, was applied. …”
Get full text
Get full text
Thesis -
9
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
10
Mutable composite firefly algorithm for gene selection in microarray based cancer classification
Published 2022“…Hence, this study proposed to modify the Firefly Algorithm (FA) along with the Correlation-based Feature Selection (CFS) filter for the gene selection task. …”
Get full text
Get full text
Thesis -
11
Modified archive update mechanism of multi-objective particle swarm optimization in fuzzy classification and clustering
Published 2022“…For optimum results in performance analyses, the technique was evaluated using nine datasets: five datasets were artificially generated, while four were real-world datasets sourced from KEEL over MCPSO and IMCPSO algorithms. …”
Get full text
Get full text
Thesis -
12
A novel islanding detection technique using modified Slantlet transform in multi-distributed generation
Published 2019“…A Harmony Search Algorithm (HSA) is used to optimally specify suitable scales of Slantlet transform and Slantlet decomposition levels for accurate islanding classification. …”
Get full text
Get full text
Get full text
Article -
13
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
14
-
15
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
16
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
17
An ensemble of neural network and modified grey wolf optimizer for stock prediction
Published 2019“…The proposed approachoutperforms existing available meta-heuristic algorithms. Specifically, the proposed model achieved 97% classification rate, 95% precise prediction and less than 2.0 error rate. …”
Get full text
Get full text
Thesis -
18
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
19
Improvement of land cover mapping using Sentinel 2 and Landsat 8 imageries via non-parametric classification
Published 2020“…The last phase involves developing a new fusion algorithm using SVM and Fuzzy K-Means Clustering (FKM) algorithms for Sentinel 2 data to enhance LCM accuracy. …”
Get full text
Get full text
Thesis -
20
A hybrid approach for artificial immune recognition system / Mahmoud Reza Saybani
Published 2016“…Resource competition part of AIRS poses another problem, here, premature memory cells are generated and therefore classification accuracy decreases. …”
Get full text
Get full text
Thesis
