Search Results - (( programming binary classification algorithm ) OR ( java application means algorithm ))
Search alternatives:
- binary classification »
- programming binary »
- application means »
- java application »
- means algorithm »
-
1
-
2
Analysis Of Personal Protective Equipment Classification Method Using Deep Learning
Published 2022“…Based on the result, CNN algorithm is a good algorithm as the binary classification of PPE achieved high accuracy result.…”
Get full text
Get full text
Undergraduates Project Papers -
3
Comparison of Recursive Feature Elimination and Boruta as Feature Selection in Greenhouse Gas Emission Data Classification
Published 2024“…The Support Vector Machine (SVM) algorithm is employed to evaluate classification performance, focusing on binary classification into "high" and "low" categories in this study. …”
Get full text
Get full text
Get full text
Article -
4
Simulation on Emotion Recognition for Autism Therapy
Published 2017“…This paper mainly focusing on the simulation of emotion recognition software based on the Local Binary Pattern (LBP) algorithm to extract the features from the image. …”
Get full text
Get full text
Final Year Project -
5
-
6
Raspberry Pi-Based Finger Vein Recognition System Using PCANet
Published 2018“…Factors which impact PCANet are studied to identify the limitations of PCANet. For classification, k-Nearest Neighbours (kNN) with Euclidean distance algorithm is implemented. …”
Get full text
Get full text
Monograph -
7
A web-based implementation of k-means algorithms
Published 2022“…The K-means algorithm has been around for over a century. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Derivations of some classes of Leibniz algebras
Published 2013“…Starting from dimensions four and above there are classifications of subclasses (in dimension four nilpotent case and in dimensions (5-8) there are classifications of filiform Leibniz algebras). …”
Get full text
Get full text
Thesis -
9
-
10
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
Get full text
Get full text
Journal -
11
Feature clustering for pso-based feature construction on high-dimensional data
Published 2019“…The clustering of each features are proven to be accurate in feature selection (FS), however, only one study investigated its application in FC for classification. The study identified some limitations, such as the implementation of only two binary classes and the decreasing accuracy of the data. …”
Get full text
Get full text
Get full text
Article -
12
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
13
Biometrics electronic purse
Published 1999“…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
Get full text
Get full text
Get full text
Proceeding Paper -
14
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
15
An optimal under frequency load shedding scheme for islanded distribution network / Amalina Izzati Md Isa
Published 2018“…Inclusive with the design of UFLS is a new module referred as Load Shedding Module (LSM). Two new algorithms i.e., Load Classification based Fuzzy Logic (LCFL) and Binary Evolutionary Programming (BEP) are introduced in the module. …”
Get full text
Get full text
Thesis -
16
-
17
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020Get full text
Get full text
Thesis -
18
Mining Sequential Patterns Using I-PrefixSpan
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Text messaging encryption system
Published 2012Get full text
Get full text
Undergraduates Project Papers -
20
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis
