Search Results - (( java implementation learning algorithm ) OR ( binary classification clustering algorithm ))
Search alternatives:
- classification clustering »
- implementation learning »
- binary classification »
- java implementation »
- learning algorithm »
-
1
Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier
Published 2018“…There are a lot of feature extraction methods and classification methods for iris classification. Classic local binary pattern (LBP) is one of the most useful feature extraction methods. …”
Get full text
Get full text
Monograph -
2
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Based on the above components and circumstances, many studies have been performed on data clustering problems. Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
Get full text
Get full text
Thesis -
3
Global and local clustering soft assignment for intrusion detection system: a comparative study
Published 2017“…The results show that the global clustering approach outperforms the local clustering approach for binary classification. …”
Get full text
Get full text
Get full text
Article -
4
Spatial Clustering Algorithm for Time Series Rainfall Data Using X-Means Data Splitting
Published 2017“…The performance of the clustering algorithm gets even worse if it relies on actual data and many clustering algorithms are often faced with conflict in handling high dimensional data. …”
Get full text
Get full text
Get full text
Article -
5
Feature clustering for pso-based feature construction on high-dimensional data
Published 2019“…The clustering of each features are proven to be accurate in feature selection (FS), however, only one study investigated its application in FC for classification. …”
Get full text
Get full text
Get full text
Article -
6
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
7
Development of compound clustering techniques using hybrid soft-computing algorithms
Published 2006“…The hierarchical fuzzy clustering algorithm developed in this work assign the overlapping structures (structures having more than one activity) to more than one clusters if their fuzzy membership values are significantly high for those clusters. …”
Get full text
Get full text
Monograph -
8
Machine learning approach for stress detection based on alpha-beta and theta-beta ratios of EEG signals
Published 2021“…This study will ultimately contribute to society's development with improved robust machine learning algorithm for binary classification.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
Enhancement of new smooth support vector machines for classification problems
Published 2011“…The results of this study showed that MKS-SSVM was effective to diagnose medical dataset and this is promising results compared to the previously reported results. SSVM algorithms are developed for binary classification. …”
Get full text
Get full text
Thesis -
10
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
12
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
13
Analytical framework for predicting online purchasing behavior in Malaysia using a machine learning approach
Published 2025“…The framework uses machine learning methods, including classification, clustering, feature selection, and parameter tuning, to improve accuracy and reliability. …”
Get full text
Get full text
Thesis -
14
The identification of oreochromis niloticus feeding behaviour through the integration of photoelectric sensor and logistic regression classifier
Published 2018“…The signals acquired from the sensors are converted into binary data. The hunger behaviour classes are determined through k-means clustering algorithm, i.e., satiated and unsatiated. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
A study on component-based technology for development of complex bioinformatics software
Published 2004“…From the enriched GO tree, the BTreeBicluster algorithm is applied during the clustering process. …”
Get full text
Get full text
Monograph -
16
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
17
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
18
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
19
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
20
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis
