Search Results - (( java pattern classification algorithm ) OR ( using interface propagation algorithm ))

Refine Results
  1. 1

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  4. 4

    INDOOR LOCATION SENSING USING WLAN by MOORTHY, SATHIS KUMAR

    Published 2007
    “…The system was developed in MATLAB platform that comprises of location sensing algorithm (Nearest Neighbor), signal strength database, client-server interface and graphical user interface (GUI). …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    VHDL modeling of EMG signal classification using artificial neural network by Ahsan, Md. Rezwanul, Ibrahimy, Muhammad Ibn, Khalifa, Othman Omran, Ullah, Mohammad Habib

    Published 2012
    “…A back-propagation neural network with Levenberg-Marquardt training algorithm has been used for the classification of EMG signals. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Parallel implementation of complexity reduction approach to fourth order approximation on 2D free space wave propagation. by Hasan, Mohammad Khatim, Othman, Mohamed, Abbas, Zulkifly, Sulaiman, Jumat, Ahmad, Fatimah

    Published 2008
    “…In this paper we solve 2D wave propagation problems on a Symmetrical Multiprocessor machine using message-passing interface. …”
    Get full text
    Get full text
    Article
  8. 8

    Outdoor User Location over 802.11 Ad-hoc Network by Roslan, Mohd Azrik

    Published 2006
    “…At the end of this work, the site testing has validated that this algorithm can be used to determine the user location in outdoor environment with considerable accuracy.…”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Design of neuron architecture on FPGA for electromechanical sensor signals / Khairudin Mohamad by Mohamad, Khairudin

    Published 2012
    “…For the MAC was found that by using topology 2, propagation can be reducing up to 19.145ns…”
    Get full text
    Get full text
    Thesis
  10. 10

    Development of finite element model for soil-structure interaction by Shoaei, Mohammad Dalili

    Published 2014
    “…In order to develop an efficient ANN system, the required algorithm is built through trial and error procedure and then through this process feed-forward network with back-propagation training function is implemented. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm by Diallo, Alhassane Saliou, Al-Khateeb, Wajdi Fawzi Mohammed, Olanrewaju, Rashidah Funke, Fatai, Sado

    Published 2014
    “…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Hand Gesture Recognition Using Artificial Neural Networks by Mustafa, Mohd Amrallah

    Published 2007
    “…A multilayer perceptron with back-propagation algorithm has been developed, thus the system is actually in-built to be used as a human machine interface. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Handwriting recognition using webcam for data entry by Wong , Yoong Xiang

    Published 2014
    “…The modules have its distinct characteristics which is trained using the Back-Propagation algorithm to cluster the pattern recognition capabilities among different samples of handwriting. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    Handwriting Recognition Using Artificial Neural Network by Goh , Siew Yin

    Published 2004
    “…This network is trained using the Back-Propagation algorithm to identify similarities and patterns among different handwriting samples. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Monitoring and prediction of bearing failure by acoustic emission and neural network by Mahamad, Abd Kadir

    Published 2005
    “…This program was implementcd using graphical user interface (OUI) features that can be implemented by using a MA TLAB OUr. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Automatic mapping of concrete strength in structural element by Hamid, Roszilah, Mohamed, Ramizi, Mohd. Nayan, Khairul Anuar, Osman, Siti Aminah, Mohd. Yusof, Kamarudin

    Published 2006
    “…Signal-processing techniques were used to compute the data; Fourier Transform to translate a time-series signal into frequency domain, concrete strength calculation, interpolation technique and a Graphic User Interface (GUI) to complete the mapping algorithms.…”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Electromygraphy (EMG) signal based hand gesture recognition using Artificial Neural Network (ANN) by Ahsan, Md. Rezwanul, Ibrahimy, Muhammad Ibn, Khalifa, Othman Omran

    Published 2011
    “…The EMG pattern signatures are extracted from the signals for each movement and then ANN utilized to classify the EMG signals based on features. A back-propagation (BP) network with Levenberg-Marquardt training algorithm has been used for the detection of gesture. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Smart attendance system with Iot based face recognition using deep learning approach by Seah, You

    Published 2023
    “…The current norm delineates the deployment of smart attendance system using RFID tags, fingerprints, iris scans, voice recognition, etc. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    Dual authentication for bluetooth connection by Saliou, Diallo Alhassane, Al-Khateeb, Wajdi Fawzi Mohammed, Olanrewaju, Rashidah Funke, Fatai, Sado

    Published 2014
    “…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). …”
    Get full text
    Get full text
    Get full text
    Article