Search Results - (( java pattern classification algorithm ) OR ( user interface perception algorithm ))
Search alternatives:
- pattern classification »
- interface perception »
- perception algorithm »
- java »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
Get full text
Get full text
Thesis -
2
Entiment analysis of public perception on AI chatbots using Support Vector Machine (SVM) algoritm / Tuan Nur Azlina Tuan Ibrahim
Published 2024“…The SVM-based sentiment analyzer offers a user-friendly tool bridging complex algorithms and practical applications. …”
Get full text
Get full text
Thesis -
3
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
4
The design for antrophomorphic sociable agent interaction through emotion detection
Published 2003“…This research works addresses on faces features through simulation of anthropomorphic agent.A salience feature of this definition of emotion is described in terms of goals and roles.Therefore, it provides a basic framework of goal-driven processing, which is to investigate computational models of emotion.The main goal of this research is to provide a natural interaction scheme where the affective interaction emotive state of the user can be identified.One aspect of developing such a capability is the ability of the system to recognize emotional state using intelligent supervised learning algorithms, personality of the user and respond appropriately.An anthropomorphic agent will serve to express the reaction through affective feedback given. …”
Get full text
Get full text
Conference or Workshop Item -
5
Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT
Published 2021“…The problem of developing effective and secure routing protocols has drawn more interest in network research with the popularization of IoT-connected devices. The perception of ensuring security is expensive in terms of computation, power and user-interface components because of low-power IoT objects or sensor nodes. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
A secure trust aware ACO-Based WSN routing protocol for IoT
Published 2022“…The IoT with the integration of wireless sensor networks possess a number of unique characteristics, so the implementation of security in such a restrictive environment is a challenging task. Due to the perception that security is expensive in terms of computation, power and user-interface components, and as sensor nodes or low-power IoT objects have limited resources, it is desired to design security mechanisms especially routing protocols that are light weighted. …”
Get full text
Get full text
Get full text
Article -
7
How do mobile games connect us? a perspective on social media affordances
Published 2025“…The findings indicate that mobile games utilize interface interactions, platform algorithms, and voice media affordances to provide conditions for identity perception, relational connectivity, and contextual imagination, thereby facilitating social interactions. …”
Get full text
Get full text
Get full text
Article
