Search Results - (( java pattern classification algorithm ) OR ( using scale replication algorithm ))
Search alternatives:
- pattern classification »
- replication algorithm »
- scale replication »
- using scale »
- java »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
Get full text
Get full text
Thesis -
2
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
3
Replica Creation Algorithm for Data Grids
Published 2012“…Current algorithms focus on number of accesses in deciding which file to replicate and where to place them, which ignores resources’ capabilities. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…In Data Grid, data replication is a widely used technique for managing data, where exact copies of data or replicas are created and stored at many distributed sites. …”
Get full text
Get full text
Thesis -
5
Face Detection System / Chan Beh Teng
Published 2004“…Skin regions are then separated from skin regions by segmenting the gray-scale image. After that, the system will locate the frontal human face(s) within the skin regions, using template matching. …”
Get full text
Get full text
Thesis -
6
Data-driven multi-fault detection in pipelines utilizing frequency response function and artificial neural networks
Published 2025“…The subsequent data processing stage involved the application of an ANN algorithm for pattern recognition to analyze and classify the acquired data, identifying patterns associated with the replicated fault conditions. …”
Get full text
Get full text
Get full text
Article -
7
Adaptive medium access control protocol of Wifi-Halow for home machine-to-machine network
Published 2019“…The increasing exibility of wireless network card used also raises the concern of resources availability due to selfish attack. …”
Get full text
Get full text
Thesis -
8
Signal to noise ratio as a guideline to obtain valid auditory brainstem response results
Published 2020“…Typically, the technique uses to identify a true ABR is by using response replication analysis. …”
Get full text
Get full text
Get full text
Article
