Search Results - (( its activation selection algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- activation selection »
- selection algorithm »
- java application »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Two-stage feature selection using ranking self-adaptive differential evolution algorithm for recognition of acceleration activity
Published 2018“…Consequently, this paper proposes a ranking self-adaptive differential evolution (rsaDE) feature selection algorithm. The proposed algorithm is capable of selecting the optimal feature subsets while improving the recognition of acceleration activity using a minimum number of features. …”
Get full text
Get full text
Get full text
Article -
3
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
4
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…However, the learning complexity of classification is increased due to the expansion number of learning model. Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
Get full text
Get full text
Thesis -
5
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
6
-
7
Adaptive Initial Contour and Partly-Normalization Algorithm for Iris Segmentation of Blurry Iris Images
Published 2022“…The findings revealed that the algorithm outperformed the other active contour-based approaches in computational time and segmentation accuracy. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
9
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…The system is able to update the information from the database provided that the administrator monitors its activities periodically. This system is achieved using the Genetic Algorithm which is capable of performing information retrieval and learning algorithm. …”
Get full text
Get full text
Thesis -
10
Development of compound clustering techniques using hybrid soft-computing algorithms
Published 2006“…A good clustering method groups similar compounds together, to ensure all activity classes are represented, whilst separating active and inactive compounds into different sets of clusters, to avoid an inactive compound being selected as a cluster representative. …”
Get full text
Get full text
Monograph -
11
A regression test case selection and prioritization for object-oriented programs using dependency graph and genetic algorithm
Published 2014“…This paper presents an evolutionary regression test case prioritization for object-oriented software based on dependence graph model analysis of the affected program using Genetic Algorithm. The approach is based on optimization of selected test case from test suite T. …”
Get full text
Get full text
Get full text
Article -
12
Decoding of visual activity patterns from fMRI responses using multivariate pattern analyses and convolutional neural network
Published 2017“…Selection of significant features is an important part of fMRI data analysis, since it reduces the computational burden and improves the prediction performance; significant features are selected using t -test. …”
Get full text
Get full text
Article -
13
LASSO-type estimations for threshold autoregressive and heteroscedastic time series models.
Published 2020“…In this thesis, we propose Least Absolute Shrinkage and Selection Operator (LASSO) type estimators to perform simultaneous parameter estimation and model selection for five specific univariate and multivariate time series models, and develop several algorithms to compute these estimators. …”
Get full text
Get full text
UMK Etheses -
14
Clustering of Chemical Compounds using Unsupervised Neural Networks Algorithms: a comparison
Published 2006“…The results show that the Wards and Group Average methods are equally good; however, the performance of Kohonen neural selforganizing maps (SOM) is also important due to its almost similar performance as the hierarchical clustering methods with the advantage of its efficiency.…”
Get full text
Get full text
Conference or Workshop Item -
15
Clustering of chemical compounds using unsupervised neural networks algorithms : a comparison
Published 2006“…The results show that the Wards and Group Average methods are equally good; however, the performance of Kohonen neural selforganizing maps (SOM) is also important due to its almost similar performance as the hierarchical clustering methods with the advantage of its efficiency…”
Get full text
Get full text
Conference or Workshop Item -
16
Feature selection in intrusion detection, state of the art: A review
Published 2016“…Novel feature selection techniques have been developed due to its importance in network intrusion domain. …”
Get full text
Get full text
Article -
17
An Automated Summarization Assessment Algorithm for Identifying Summarizing Strategies
Published 2016“…An innovative aspect of our algorithm lies in its ability to identify summarizing strategies at the syntactic and semantic levels. …”
Get full text
Get full text
Article -
18
Enhancement Of Clustering Algorithm Using 3D Euclidean Distance To Improve Network Connectivity In Wireless Sensor Networks For Correlated Node Behaviours
Published 2024“…Then, the enhancement clustering algorithm will be constructed based on correlated degree which is selected as a cluster head to serves as a link connectivity between individual node and its neighbor to form network clustering. …”
thesis::doctoral thesis -
19
Database encryption for a Web-based Claims System
Published 2008“…Testing was also done on the encryption algorithms and Web browsers selected by increasing both the text length size and key length size and observed its performances. …”
Get full text
Thesis -
20
Design of radix-4 single path delay fast fourier transform processor with genetic algorithms optimization
Published 2011“…The genetic algorithms is proven to be a very effective method in optimization by using the way imitating natural process of living beings such as crossover, mutation and selection. …”
Get full text
Get full text
Thesis
