Search Results - (( pattern classification parallel algorithm ) OR ( post implementation based algorithm ))
Search alternatives:
- classification parallel »
- pattern classification »
- implementation based »
- post implementation »
-
1
-
2
EMG motion pattern classification through design and optimization of neural network
Published 2012“…A back-propagation neural network with Levenberg-Marquardt training algorithm has been utilized for the classification of EMG signals. …”
Get full text
Get full text
Get full text
Proceeding Paper -
3
EMG motion pattern classification through design and optimization of Neural Network
Published 2012Get full text
Working Paper -
4
Probabilistic ensemble fuzzy ARTMAP optimization using hierarchical parallel genetic algorithms
Published 2015“…To further augment the ARTMAP's pattern classification ability, multiple ARTMAPs were optimized via genetic algorithm and assembled into a classifier ensemble. …”
Get full text
Get full text
Get full text
Article -
5
Robust tweets classification using arithmetic optimization with deep learning for sustainable urban living
Published 2024“…In this view, this research develops an arithmetic optimization algorithm with deep learning based tweets classification (AOADL-TC) approach for sustainable living. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining.
Published 2005“…The accuracy for rules and classification resulted from the TIP method are compared with other methods such as Standard Integer Programming (SIP) and Decision Related Integer Programming (DRIP) from Rough Set, Genetic Algorithm (GA), Johnson reducer, HoltelR method, Multiple Regression (MR), Neural Network (NN), Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5); all other classifiers that are mostly used in the classification tasks. …”
Get full text
Get full text
Thesis -
7
Fpga-Based Accelerator For The Identification Of Finger Vein Pattern Via K-Nearest Centroid Neighbors
Published 2016“…In recent years, finger vein recognition has emerged as a promising biometric technology due to the fact that each person in this world has unique finger vein pattern. Over the past few years, various finger vein recognition algorithms and techniques have been proposed by researchers and scholars. …”
Get full text
Get full text
Thesis -
8
Electromygraphy (EMG) signal based hand gesture recognition using Artificial Neural Network (ANN)
Published 2011“…ANNs are particularly useful for complex pattern recognition and classification tasks. The capability of learning from examples, the ability to reproduce arbitrary non-linear functions of input, and the highly parallel and regular structure of ANNs make them especially suitable for pattern recognition tasks. …”
Get full text
Get full text
Get full text
Proceeding Paper -
9
Power system network splitting and load frequency control optimization using ABC based algorithms / Kanendra Naidu a/l Vijyakumar
Published 2015“…This research presents a modified optimization program for the system splitting problem in large scale power system based on Artificial Bee Colony algorithm and graph theory. …”
Get full text
Get full text
Thesis -
10
Hybrid harmony search-artificial intelligence models in credit scoring
Published 2019“…This is believed to be due to the different approaches of both classifiers in capturing data pattern for classification. In terms of computational time, compared to GS-tuned models and the respective HS hybrids, the proposed hybrid MHS-SVM and MHS-RF have reported time improvement of more than 50%, while the parallel computation have saved up approximately 80% of the computational time. …”
Get full text
Get full text
Thesis -
11
-
12
Development of obstacle avoidance technique in web-based geographic information system for traffic management using open source software
Published 2014“…The shortest path routing is one of the well-known network analysis techniques implemented in road management systems. Pg Routing as an extension of Postgre SQL/Post GIS database is an open source library that implements the Dijkstra shortest path algorithm. …”
Get full text
Get full text
Get full text
Article -
13
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
14
The implementation of post-processing data thinning for multibeam echo sounding data
Published 2006Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Development of an Automated Technique for Reconstructing Jawi Characters in Historical Documents
Published 2007“…The algorithms have been implemented using Matlab software version 6.5. …”
Get full text
Get full text
Thesis -
16
A Survey of metaheuristic approaches for curriculum based course timetabling problem
Published 2017“…Purpose - The aim of this paper is to explore approaches applied for solving CBCTT by presenting features of implementation related to it.The idea is to prepare references structure for future implementation.There are numerous surveys related to approaches in University course timetabling problem (UCTP) (Babaei, Karimpour, & Hadidi, 2014; Nandhini & Kanmani, 2009).Usually surveys that carried out involved post enrollment course timetabling problem (PECTT) and curriculum-based course timetabling problem (CBCTT) together in one literature. …”
Get full text
Get full text
Conference or Workshop Item -
17
Toward Quantum-Resilient PKI: A Systematic Literature Review of Post-Quantum Certificates Model
Published 2026journal::journal article -
18
A new countermeasure to combat the embedding-based attacks on the goldreich-goldwasser-halevi lattice-based cryptosystem
Published 2024“…Despite being considered the first practical lattice-based cryptosystem, interest from the post-quantum cryptography society in the Goldreich-Goldwasser-Halevi (GGH) lattice-based cryptosystem drastically drop due to the embedding-based attacks. …”
Get full text
Get full text
Get full text
Article -
19
A new countermeasure to combat the embedding-based attacks on the Goldreich-Goldwasser-Halevi lattice-based cryptosystem
Published 2024“…Despite being considered the first practical lattice-based cryptosystem, interest from the post-quantum cryptography society in the Goldreich-Goldwasser-Halevi (GGH) lattice-based cryptosystem drastically drop due to the embedding-based attacks. …”
Get full text
Get full text
Get full text
Article -
20
Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique
Published 2018“…The current research presents the implementation of an integrated kurtosisbased algorithm for a z-filter technique (Ikaz) to kurtosis ratio (Ikaz-kurtosis), for this allows automatic selection of the IMF that should be used. …”
Get full text
Get full text
Thesis
