Search Results - (( pre validation using algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- validation using »
- java application »
- using algorithm »
- pre validation »
-
1
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…The purpose of choosing parameters is to get the best generalization performance. Genetic Algorithm (GA) is used to search for the best parameter of SVM classification by using combination of random and pre-populated genomes from Pre-Populated Database (PPD). …”
Conference Paper -
2
Multi-Objectives Memetic Discrete Differential Evolution Algorithm for Solving the Container Pre-Marshalling Problem
Published 2019“…In addition, it improves the exploration and exploitation capabilities of the algorithm. The standard pre-marshalling benchmark dataset (i.e., Bortfeldt-Forster) is used to evaluate the effectiveness of the proposed algorithm. …”
Get full text
Get full text
Article -
3
A comparative analysis of machine learning algorithms for diabetes prediction
Published 2024“…Nine features which are Age, Blood pressure, Skin thickness, Glucose, Diabetes pedigree function, Pregnancy, BMI, Insulin level, and Outcome been used for the prediction of diabetes. The methodology involves data collection, pre-processing, and training the algorithms using k-fold cross-validation. …”
Get full text
Get full text
Get full text
Article -
4
Predicting bankruptcy using ant colony optimization / Nur Syafiqah Abdul Ghani
Published 2021“…In model development, Ant-Miner was used which consists of three steps. In model validation, to quantify accuracy by approving the informational collection, Ant Colony Optimization Algorithm was used and it was compared with the J48 algorithm. …”
Get full text
Get full text
Student Project -
5
EEG Simulation Hardware for Realistic Seizure, Preseizure and Normal Mode Signal Generation
Published 2015“…The proposed hardware simulator will enhance researchers and hardware validators to simulate, validate and test their detection algorithms forehand, as well as for clinicians to use this system for training as well as for academic exercises. …”
Get full text
Get full text
Citation Index Journal -
6
EEG-and MRI-based epilepsy source localization using multivariate empirical mode decomposition and inverse solution method
Published 2018“…Therefore proposed algorithm has the advantages to localize EZ using ESL inexpensively and accurately which promotes usage of this valuable technique for epilepsy pre-surgical evaluation.…”
Get full text
Get full text
Thesis -
7
A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi
Published 2015“…Several experiments are performed to validate the effectiveness and robustness of the proposed algorithm against different attacks, such as pre-processing attacks. …”
Get full text
Get full text
Thesis -
8
Distracted driver detection with deep convolution neural networks
Published 2023“…The author created his algorithm and 12 Keras pre-trained models such as VGG16 and Xception, with adding 5 layers on the top of them. …”
text::Final Year Project -
9
Optimization of Multilayer Perceptron (MLP) network training algorithms for agrwood oil quality separation / Noratikah Zawani Mahabob ... [et al.]
Published 2020“…The work was done by using MATLAB version 2017a. The training algorithms were applied to agarwood oil data to classify its compounds to the different quality either in high or low. …”
Get full text
Get full text
Conference or Workshop Item -
10
Hardware Simulator for Seizure, Preseizure and Normal Mode Signal Generation in LabVIEW Environment for Research
Published 2013“…The proposed hardware simulator will enhance researchers and hardware validators to simulate, validate and test their detection algorithms forehand, before actual testing the algorithm in the actual standalone hardware. …”
Get full text
Get full text
Get full text
Non-Citation Index Journal -
11
Improvement real-time detection of moving vehicle in a dynamic scene using shadow removal method / Khairul Azman Ahmad, Mohd Halim Mohd Noor,Mohamad Adha Mohamad Idin
Published 2011“…There are four major steps in a background subtraction algorithm, which are pre-processing, background modeling, foreground detection, and data validation. …”
Get full text
Get full text
Research Reports -
12
Electroencephalography Simulation Hardware for Realistic Seizure, Preseizure and Normal Mode Signal Generation
Published 2015“…The proposed hardware simulator will enhance researchers and hardware validators to simulate, validate and test their detection algorithms forehand, as well as for clinicians to use this system for training as well as for academic exercises. …”
Get full text
Get full text
Article -
13
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Intelligent grading of agarwood essential oil quality using artificial neural network (ANN) / Noratikah Zawani Mahabob
Published 2022“…The result revealed that the ANN performance had the highest accuracy when training using the LM training algorithm. The ANN with the seven inputs (seven significant compounds from Z-score pre-processing technique) trained by one hidden neuron of LM algorithm provided the best performance with 100% for accuracy, specificity, sensitivity and precision as well as minimum convergence epoch.…”
Get full text
Get full text
Thesis -
15
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
16
Prediction of blood-brain barrier permeability of compounds by machine learning algorithms
Published 2024“…Since the CNS is often inaccessible to many complex procedures and performing in-vitro permeability studies for thousands of compounds can be laborious, attempts were made to predict the permeation of compounds through BBB by implementing the Machine Learning (ML) approach. In this work, using the KNIME Analytics platform, 4 predictive models were developed with 4 ML algorithms followed by a ten-fold cross-validation approach to predict the external validation set. …”
Get full text
Get full text
Get full text
Article -
17
A New And Fast Rival Genetic Algorithm For Feature Selection
Published 2021“…The genetic algorithm (GA) as a fundamental optimization tool has been widely used in feature selection tasks. …”
Get full text
Get full text
Get full text
Article -
18
Exploratory analysis with association rule mining algorithms in the retail industry / Alaa Amin Hashad ... [et al.]
Published 2024“…Data pre-processing was performed to clean and encode the data to be used in the model. …”
Get full text
Get full text
Article -
19
Optimized clustering with modified K-means algorithm
Published 2021“…Clustering technique is able to find hidden patterns and to extract useful information from huge data. Among the techniques, the k-means algorithm is the most commonly used technique for determining optimal number of clusters (k). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
A Novel Wrapper-Based Optimization Algorithm for the Feature Selection and Classification
Published 2023“…The performance of the proposed SCSO algorithm was compared with six state-of-the-art and recent wrapper-based optimization algorithms using the validation metrics of classification accuracy, optimum feature size, and computational cost in seconds. …”
Get full text
Get full text
Article
