Search Results - (( java implementation modified algorithm ) OR ( parametric classification based algorithm ))
Search alternatives:
- parametric classification »
- implementation modified »
- classification based »
- java implementation »
-
1
-
2
Improvement of land cover mapping using Sentinel 2 and Landsat 8 imageries via non-parametric classification
Published 2020“…The second stage involved assessing the spatial resolution effect through utilizing Landsat 8 (30 m) and Sentinel (10 m) data on LCM accuracy using SVM, K-Nearest Neighbor (K-NN), Random Forest (RF), and Neural Network (NN) algorithms. Based on the concluding overall analysis, the classification accuracy derived from Sentinel 2 imagery utilizing SVM and RF, Landsat 8 applying SVM donated higher than other methods of classification. …”
Get full text
Get full text
Thesis -
3
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
4
Nearest neighbour group-based classification
Published 2010“…In this paper, we extend three variants of the nearest neighbour algorithm to develop a number of non-parametric group-based classification techniques. …”
Get full text
Get full text
Get full text
Article -
5
Validation on an enhanced dendrite cell algorithm using statistical analysis
Published 2017“…In this study, we evaluated the performance of the enhanced algorithm called dendrite cell algorithm using sensitivity, specificity, false positive rate, and accuracy and validated the result using parametric and non parametric statistical significant tests. …”
Get full text
Get full text
Get full text
Article -
6
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
7
-
8
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
9
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
10
Balancing Exploitation And Exploration Search Behavior On Nature-Inspired Clustering Algorithms
Published 2018“…The experimental results are also thoroughly evaluated and verified via non-parametric statistical analysis. Based on the obtained experimental results, the OGC, DPSO, and VDEO frameworks achieved an average enhancement up to 24.36%, 9.38%, and 11.98% of classification accuracy, respectively. …”
Get full text
Get full text
Thesis -
11
Novel voice activity detection based on cepstrum moments
Published 2010Get full text
Get full text
Conference or Workshop Item -
12
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
13
Development of compound clustering techniques using hybrid soft-computing algorithms
Published 2006“…Previously, there is limited work on the clustering and classification of biologically active compounds into their activity based classes using fuzzy and neural network. …”
Get full text
Get full text
Monograph -
14
Oil palm mapping over Peninsular Malaysia using Google Earth Engine and machine learning algorithms
Published 2020“…In this study, 30 m Landsat 8 data were processed using a cloud computing platform of Google Earth Engine (GEE) in order to classify oil palm land cover using non-parametric machine learning algorithms such as Support Vector Machine (SVM), Classification and Regression Tree (CART) and Random Forest (RF) for the first time over Peninsular Malaysia. …”
Get full text
Get full text
Get full text
Article -
15
Hybrid conjugate gradient using exact line search in photovoltaic system / Muhammad Ariiq Iqbaal Azizul Firdaus
Published 2025“…Various studies have been undertaken by implementing the CG method in image restoration, optimal rocket landing guidance and motion control field. There are a few classifications of CG method such as classical, hybrid, three-term and parametric CG methods. …”
Get full text
Get full text
Thesis -
16
Skin Colour Detection Based On An Adaptive Multi-Thresholding Technique
Published 2007“…The model is based on the bivariate normal distribution of the skin chromatic subspace. …”
Get full text
Get full text
Thesis -
17
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
18
Computational analysis of biological data: Where are we?
Published 2024“…Using computational modeling, classification algorithms can be applied to microarray and RNA sequencing data (such as hierarchical clustering - HCL, t-SNE and principal component analysis - PCA), and high-resolution images can be generated based on the analyzed data and patient samples. …”
Get full text
Get full text
Get full text
Get full text
Book Chapter -
19
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
Get full text
Get full text
Thesis -
20
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…There is also a need to consider implementing this strategy for dynamic object-oriented languages such as Python, Lisp, and Smalltalk.…”
Get full text
Get full text
Thesis
