Search Results - (( java application customization algorithm ) OR ( mere classification using algorithm ))
Search alternatives:
- customization algorithm »
- classification using »
- mere classification »
- java application »
- using algorithm »
-
1
On the exploration and exploitation in popular swarm-based metaheuristic algorithms
Published 2018“…This study, therefore, performed in-depth empirical analysis by quantitatively analyzing exploration and exploitation of five swarm-based metaheuristic algorithms. The analysis unearthed explanations the way algorithms performed on numerical problems as well as on real-world application of classification using adaptive neuro-fuzzy inference system (ANFIS) trained by selected metaheuristics. …”
Get full text
Get full text
Get full text
Article -
2
-
3
Classification Modeling for Malaysian Blooming Flower Images Using Neural Networks
Published 2013“…The appearance of the image itself such as variation of lights due to different lighting condition, shadow effect on the object’s surface, size, shape, rotation and position, background clutter, states of blooming or budding may affect the utilized classification techniques. This study aims to develop a classification model for Malaysian blooming flowers using neural network with the back propagation algorithms. …”
Get full text
Get full text
Get full text
Thesis -
4
Discovering decision algorithm from a distance relay event report
Published 2009“…The classification accuracy and the area under the ROC curve measurements provided an acceptable evaluation of the fact that the discovered relay decision algorithm.…”
Get full text
Get full text
Get full text
Article -
5
Optimisation of neural network with simultaneous feature selection and network prunning using evolutionary algorithm
Published 2015“…Most advances on the Evolutionary Algorithm optimisation of Neural Network are on recurrent neural network using the NEAT optimisation method. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
7
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Biometric identification and recognition for iris using failure rejection rate (FRR) / Musab A. M. Ali
Published 2016“…The subsequent step is using the DAUB3 wavelet transform for feature extraction along with the application of an additional step for biometric template security that is the Non-invertible transform (cancelable biometrics method) and finally utilizing the Support Vector Machine (Non-linear Quadratic kernel) for matching/classification. …”
Get full text
Get full text
Thesis
