Search Results - (( pattern classification parallel algorithm ) OR ( java data prevention algorithm ))
Search alternatives:
- classification parallel »
- pattern classification »
- prevention algorithm »
- data prevention »
- java »
-
1
-
2
EMG motion pattern classification through design and optimization of neural network
Published 2012“…A back-propagation neural network with Levenberg-Marquardt training algorithm has been utilized for the classification of EMG signals. …”
Get full text
Get full text
Get full text
Proceeding Paper -
3
EMG motion pattern classification through design and optimization of Neural Network
Published 2012Get full text
Working Paper -
4
Probabilistic ensemble fuzzy ARTMAP optimization using hierarchical parallel genetic algorithms
Published 2015“…To further augment the ARTMAP's pattern classification ability, multiple ARTMAPs were optimized via genetic algorithm and assembled into a classifier ensemble. …”
Get full text
Get full text
Get full text
Article -
5
Robust tweets classification using arithmetic optimization with deep learning for sustainable urban living
Published 2024“…In this view, this research develops an arithmetic optimization algorithm with deep learning based tweets classification (AOADL-TC) approach for sustainable living. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
7
Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining.
Published 2005“…The accuracy for rules and classification resulted from the TIP method are compared with other methods such as Standard Integer Programming (SIP) and Decision Related Integer Programming (DRIP) from Rough Set, Genetic Algorithm (GA), Johnson reducer, HoltelR method, Multiple Regression (MR), Neural Network (NN), Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5); all other classifiers that are mostly used in the classification tasks. …”
Get full text
Get full text
Thesis -
8
Fpga-Based Accelerator For The Identification Of Finger Vein Pattern Via K-Nearest Centroid Neighbors
Published 2016“…In recent years, finger vein recognition has emerged as a promising biometric technology due to the fact that each person in this world has unique finger vein pattern. Over the past few years, various finger vein recognition algorithms and techniques have been proposed by researchers and scholars. …”
Get full text
Get full text
Thesis -
9
Electromygraphy (EMG) signal based hand gesture recognition using Artificial Neural Network (ANN)
Published 2011“…ANNs are particularly useful for complex pattern recognition and classification tasks. The capability of learning from examples, the ability to reproduce arbitrary non-linear functions of input, and the highly parallel and regular structure of ANNs make them especially suitable for pattern recognition tasks. …”
Get full text
Get full text
Get full text
Proceeding Paper -
10
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Obfuscation (Obfu) is a practice to make the programming code complicated to protect the Intellectual Property (IP) and prevent prohibited software Reverse Engineering (RE). …”
Get full text
Get full text
Thesis -
11
Hybrid harmony search-artificial intelligence models in credit scoring
Published 2019“…This is believed to be due to the different approaches of both classifiers in capturing data pattern for classification. In terms of computational time, compared to GS-tuned models and the respective HS hybrids, the proposed hybrid MHS-SVM and MHS-RF have reported time improvement of more than 50%, while the parallel computation have saved up approximately 80% of the computational time. …”
Get full text
Get full text
Thesis -
12
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…Machine Learning is one of the ways as a preventive method by applying the data collected from the clogging experiment in the vibration lab to build up a machine learning model for classification of flow blockage levels in the centrifugal pump. …”
Get full text
Get full text
Monograph -
13
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…It is a code with double shield protection that prevents unauthorized extraction or damaging the remote database in the server side due to malicious SQL injection. …”
Get full text
Get full text
Get full text
Article -
14
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
16
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Prototypes, simulations, observations and interviews were used as the data gathering methods. An offline FOA Java simulation was carried out to evaluate the capability of the MRA method in preventing FOA attack. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis
