Search Results - (( programme _ utilisation algorithm ) OR ( java binary classification algorithm ))
Search alternatives:
- utilisation algorithm »
- binary classification »
- java »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
Get full text
Get full text
Thesis -
2
Effectiveness of algorithm visualisation in studying complex algorithms: a case study using TRAKLA Ravie / Chandren Muniyandi, Ali Maroosi
Published 2015“…Algorithm visualisation (AV) can be utilised to improve students ’programming and programme comprehension skills. …”
Get full text
Get full text
Get full text
Article -
3
Design Methodology and Analysis of Hash Function based-on Field Programmable Gate Array for Hash-based Message Authentication Code Application
Published 2025“…Furthermore, a combination of unfolding and pipelining can also increase the throughput of hash function algorithms.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Hybrid FFT-ADALINE algorithm with fast estimation of harmonics in power system
Published 2016“…The proposed algorithm operates in good and accurate performance with the settling time is within half cycle.…”
Get full text
Get full text
Get full text
Article -
5
Scentopia: Navigating the World of Fragrance
Published 2024“…In order to solve the difficulties customers encounter while attempting to navigate the bewildering array of perfumes on the market, this study presents the creation of “Scentopia” as a Final Year Project. The programme streamlines the perfume picking process and directs users towards their ideal smell match by utilising cutting-edge algorithms, personalised scent profile, and user-friendly interfaces. …”
Get full text
Get full text
Final Year Project -
6
A machine learning approach of predicting high potential archers by means of physical fitness indicators
Published 2019“…The present study classified and predicted high and low potential archers from a set of physical fitness variables trained on a variation of k-NN algorithms and logistic regression. 50 youth archers with the mean age and standard deviation of (17.0 ± 0.56) years drawn from various archery programmes completed a one end archery shooting score test. …”
Get full text
Get full text
Article -
7
A machine learning approach of predicting high potential archers by means of physical fitness indicators
Published 2019“…The present study classified and predicted high and low potential archers from a set of physical fitness variables trained on a variation of k-NN algorithms and logistic regression. 50 youth archers with the mean age and standard deviation of (17.0 ± 0.56) years drawn from various archery programmes completed a one end archery shooting score test. …”
Get full text
Get full text
Get full text
Article -
8
Face recognition employees attendance system
Published 2022“…The Overeater (Histogram of Acquainted Grade) algorithm is used to recognise and segment the face from the VHS frame. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
FPGA-enabled binarised convolutional neural networks toward real-time embedded object recognition system
Published 2017“…In this presentation, we report the results of applying a binarised Convolutional Neural Network (CNN) and a Field Programmable Gate Array (FPGA) for image-based object recognition. …”
Get full text
Get full text
Conference or Workshop Item -
10
Nonlinear three-dimensional finite elements for composite concrete beams
Published 2012“…The accuracy and efficiency of the finite element programmes were achieved by analyzing several examples from the literature. …”
Get full text
Get full text
Thesis -
11
Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks
Published 2024“…Traditional distributed networking is replaced with SDN's more programmable centralised solution, which is built around the SDN controller. …”
Get full text
Get full text
Get full text
Get full text
Thesis
