Search Results - (( java application server algorithm ) OR ( binary classification tree algorithm ))

Refine Results
  1. 1

    Design Of Feature Selection Methods For Hand Movement Classification Based On Electromyography Signals by Too, Jing Wei

    Published 2020
    “…In this regard, this thesis proposes five FS methods for efficient EMG signals classification. The first method is the Binary Tree Growth Algorithm (BTGA), which implements a hyperbolic tangent function to convert the Tree Growth Algorithm into the binary version. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    EMG Feature Selection And Classification Using A Pbest-Guide Binary Particle Swarm Optimization by Too, Jing Wei, Tee, Wei Hown, Abdullah, Abdul Rahim, Mohd Saad, Norhashimah

    Published 2019
    “…In order to measure the effectiveness of PBPSO, binary particle swarm optimization (BPSO), genetic algorithm (GA), modified binary tree growth algorithm (MBTGA), and binary differential evolution (BDE) were used for performance comparison. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Study Of EMG Feature Selection For Hand Motions Classification by Abdullah, Abdul Rahim, Mohd Saad, Norhashimah, Too, Jing Wei

    Published 2019
    “…Thus, this paper employs two recent feature selection methods namely competitive binary gray wolf optimizer (CBGWO) and modified binary tree growth algorithm (MBTGA) to evaluate the most informative EMG feature subset for efficient classification. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Formulation of invariants for discrete orthogonal moments and image classification / Pee Chih Yang by Pee, Chih Yang

    Published 2013
    “…Discrete Tchebichef moments are selected as the implementation platform of the proposed algorithms.To evaluate the performance of invariant algorithms, empirical studies have been carried out on large set of binary images which consist of numbers, English letters, symbols, Chinese characters and objects like animals, trees and company logos under noiseless and noisy conditions. …”
    Get full text
    Get full text
    Thesis
  5. 5

    An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA by Bian, Hui

    Published 2025
    “…Traditional machine learning algorithms, such as Decision Trees, Naive Bayes, Random Forest, Random Trees, Multi-Layer Perceptron, and Support Vector Machines, have been extensively applied to address these threats. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
    Get full text
    Get full text
    Thesis
  7. 7

    Enhanced Adaptive Neuro-Fuzzy Inference System Classification Method for Intrusion Detection by Jia, Liu

    Published 2024
    “…Therefore, this binary tree cannot analyse complex features of mixed attributes and restricts the CART tree's deep-level feature recognition ability. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Bayesian random forests for high-dimensional classification and regression with complete and incomplete microarray data by Oyebayo, Olaniran Ridwan

    Published 2018
    “…These problems were extensively studied within the scope of classification (binary and multi-class) and regression (linear and survival). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  12. 12

    An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA by Hui, Bian, Chiew, Kang Leng

    Published 2025
    “…This study investigates the performance of various conventional machine learning algorithms, including decision trees, naive Bayes, naive Bayes trees, random forest, random trees, MLP, and SVM, in detecting network intrusions using binary and multi-classification approaches. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Prediction of cause of death from forensic autopsy reports using text classification techniques: A comparative study by Mujtaba, Ghulam, Shuib, Liyana, Raj, Ram Gopal, Rajandram, Retnagowri, Shaikh, Khairunisa

    Published 2018
    “…Finally, in text classification algorithms, support vector machine classifier outperforms random forest, Naive Bayes, k-nearest neighbor, decision tree, and ensemble-voted classifier. …”
    Get full text
    Get full text
    Article
  16. 16

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Named entity recognition using a new fuzzy support vector machine. by Mansouri, Alireza, Affendy, Lilly Suriani, Mamat, Ali

    Published 2008
    “…The design of our method is a kind of One-Against-All multi classification technique to solve the traditional binary classifier in SVM.…”
    Get full text
    Get full text
    Article
  19. 19

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…On the basis of the results of this research, it can be concluded that the developed prototype had high accuracy and security when transferring the file between the sender and receiver that was implemented in client-server application. This research hopes to give a clear idea to the readers about ABS algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was mainly developing using java programming. Apache Tom cat was used as a server in order to run the application smoothly. …”
    Get full text
    Get full text
    Thesis