Search Results - (( java implementation some algorithm ) OR ( binary classifications means algorithm ))
Search alternatives:
- binary classifications »
- classifications means »
- java implementation »
- implementation some »
- means algorithm »
- some algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Multichannel optimization with hybrid spectral- entropy markers for gender identification enhancement of emotional-based EEGs
Published 2021“…Consequently, optimization algorithms including binary gravitation search algorithm (BGSA) and binary particle swarm optimization (BPSO), were employed to identify the optimal channels for gender classification. …”
Get full text
Get full text
Article -
3
-
4
Spatial Clustering Algorithm for Time Series Rainfall Data Using X-Means Data Splitting
Published 2017“…Therefore, a clustering algorithm by introducing data transformation using X-means data splitting is proposed to investigate the spatial homogeneity of time series rainfall data. …”
Get full text
Get full text
Get full text
Article -
5
Classification of Cognitive Frailty in Elderly People from Blood Samples using Machine Learning
Published 2021“…A total of 7 different classification algorithms were used to predict between 6 levels of CF, the Robust and Non-Robust groups, as well as the Robust and Frail with MCI groups. …”
Get full text
Get full text
Conference or Workshop Item -
6
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
7
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
8
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
9
Segmentation Assisted Object Distinction For Direct Volume Rendering
Published 2013“…A set of image processing techniques are creatively employed in the design of K-means based hybrid segmentation algorithm.…”
Get full text
Get full text
Thesis -
10
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
11
The identification of oreochromis niloticus feeding behaviour through the integration of photoelectric sensor and logistic regression classifier
Published 2018“…The signals acquired from the sensors are converted into binary data. The hunger behaviour classes are determined through k-means clustering algorithm, i.e., satiated and unsatiated. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
13
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis -
14
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Enhanced extreme learning machine for general regression and classification tasks
Published 2020“…The method is developed for regression task by using mean/ median of ELM training errors which is then used as threshold for separating the training data and converting the continuous targets to binary. …”
Get full text
Get full text
Thesis -
16
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
17
Hybrid Neural Network With K-Means For Forecasting Response Candidate In Direct Marketing
Published 2014“…This research concerns on binary classification which is classified into two classes. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
An Optimized Semantic Segmentation Framework for Human Skin Detection
Published 2024“…The model produced satisfactory performances even with a strict split of 50 %, confirming the high efficiency of the proposed framework. The mean Jaccard index and Dice similarity measures evaluated between the annotated and predicted mask ranged from 0.80 to 0.93 in the binary classification of pixels as “skin” versus “background”. …”
Get full text
Get full text
Get full text
Article -
19
Development of compound clustering techniques using hybrid soft-computing algorithms
Published 2006“…However, their performance is slightly inferior to that of support vector machines for binary classification of chemical structures into drug and non drug compounds.…”
Get full text
Get full text
Monograph -
20
Enhanced Adaptive Neuro-Fuzzy Inference System Classification Method for Intrusion Detection
Published 2024“…Additionally, standard deviation and proposed adaptive K-means algorithms have been employed to minimize the generated rules by ANFIS from the proposed hybrid models. …”
Get full text
Get full text
Get full text
Get full text
Thesis
