Search Results - (( using action methods algorithm ) OR ( binary classification tree algorithm ))

Refine Results
  1. 1

    Behavior Recognition In Video Surveillance System For Indoor Public Areas Using Artificial Immune System by Abad, Azad

    Published 2008
    “…Artificial intelligence systems are widely used to extract and analyze the complicated human actions through logical and mathematical rules. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Design Of Feature Selection Methods For Hand Movement Classification Based On Electromyography Signals by Too, Jing Wei

    Published 2020
    “…In this regard, this thesis proposes five FS methods for efficient EMG signals classification. The first method is the Binary Tree Growth Algorithm (BTGA), which implements a hyperbolic tangent function to convert the Tree Growth Algorithm into the binary version. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    EMG Feature Selection And Classification Using A Pbest-Guide Binary Particle Swarm Optimization by Too, Jing Wei, Tee, Wei Hown, Abdullah, Abdul Rahim, Mohd Saad, Norhashimah

    Published 2019
    “…In order to measure the effectiveness of PBPSO, binary particle swarm optimization (BPSO), genetic algorithm (GA), modified binary tree growth algorithm (MBTGA), and binary differential evolution (BDE) were used for performance comparison. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Study Of EMG Feature Selection For Hand Motions Classification by Abdullah, Abdul Rahim, Mohd Saad, Norhashimah, Too, Jing Wei

    Published 2019
    “…Thus, this paper employs two recent feature selection methods namely competitive binary gray wolf optimizer (CBGWO) and modified binary tree growth algorithm (MBTGA) to evaluate the most informative EMG feature subset for efficient classification. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Formulation of invariants for discrete orthogonal moments and image classification / Pee Chih Yang by Pee, Chih Yang

    Published 2013
    “…Discrete Tchebichef moments are selected as the implementation platform of the proposed algorithms.To evaluate the performance of invariant algorithms, empirical studies have been carried out on large set of binary images which consist of numbers, English letters, symbols, Chinese characters and objects like animals, trees and company logos under noiseless and noisy conditions. …”
    Get full text
    Get full text
    Thesis
  6. 6

    An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA by Bian, Hui

    Published 2025
    “…Traditional machine learning algorithms, such as Decision Trees, Naive Bayes, Random Forest, Random Trees, Multi-Layer Perceptron, and Support Vector Machines, have been extensively applied to address these threats. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Enhanced Adaptive Neuro-Fuzzy Inference System Classification Method for Intrusion Detection by Jia, Liu

    Published 2024
    “…Therefore, this binary tree cannot analyse complex features of mixed attributes and restricts the CART tree's deep-level feature recognition ability. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Bayesian random forests for high-dimensional classification and regression with complete and incomplete microarray data by Oyebayo, Olaniran Ridwan

    Published 2018
    “…These problems were extensively studied within the scope of classification (binary and multi-class) and regression (linear and survival). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA by Hui, Bian, Chiew, Kang Leng

    Published 2025
    “…This study investigates the performance of various conventional machine learning algorithms, including decision trees, naive Bayes, naive Bayes trees, random forest, random trees, MLP, and SVM, in detecting network intrusions using binary and multi-classification approaches. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Prediction of cause of death from forensic autopsy reports using text classification techniques: A comparative study by Mujtaba, Ghulam, Shuib, Liyana, Raj, Ram Gopal, Rajandram, Retnagowri, Shaikh, Khairunisa

    Published 2018
    “…Finally, in text classification algorithms, support vector machine classifier outperforms random forest, Naive Bayes, k-nearest neighbor, decision tree, and ensemble-voted classifier. …”
    Get full text
    Get full text
    Article
  13. 13

    Named entity recognition using a new fuzzy support vector machine. by Mansouri, Alireza, Affendy, Lilly Suriani, Mamat, Ali

    Published 2008
    “…The design of our method is a kind of One-Against-All multi classification technique to solve the traditional binary classifier in SVM.…”
    Get full text
    Get full text
    Article
  14. 14

    Analytical framework for predicting online purchasing behavior in Malaysia using a machine learning approach by Mustakim, Nurul Ain

    Published 2025
    “…The descriptive analysis examines purchasing behavior through correlation and regression analyses, while the predictive model uses decision trees (J48, Random Tree, REPTree), rule-based algorithms (JRip, OneR, PART), and clustering (K-Means) to identify patterns and predict trends. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Multi-label risk diabetes complication prediction model using deep neural network with multi-channel weighted dropout by Dzakiyullah, Nur Rachman

    Published 2025
    “…The study employed two MLC frameworks: Problem Transformation methods (Binary Relevance, Classifier Chains, Label Power Set, and Calibrated Label Ranking) and Algorithm Adaptation. …”
    Get full text
    Get full text
    Thesis
  16. 16

    STUDIES ON COMPARISON OF PROPORTIONAL ON ERROR WITH PROPORTIONAL ON MEASURED VALUE IN PID CONTROLLERS by WAN MOHD RUSHIDI, WAN AMIR HAKIMI

    Published 2019
    “… PID Controllers have different algorithms or methods in which the controller action is based on Error or Process Variable (PV). …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization by Mizher, Manar Abduljabbar Ahmad, Ang, Mei Choo, Sheikh Abdullah, Siti Norul Huda, Kok, Weng Ng

    Published 2019
    “…We then evaluated the Improved AKF algorithm with the-state-of-the-art algorithms in terms of compression ratio using Paul videos and Shih-Tang dataset. …”
    Get full text
    Get full text
    Article
  18. 18

    Optimisation of support vector machine hyperparameters using enhanced artificial bee colony variant to diagnose breast cancer by Ravindran, Nadarajan

    Published 2023
    “…Machine learning offers a solution to these challenges, with support vector machines (SVM) being a popular choice for breast cancer diagnosis given its strength in binary classification, which suited well with the dataset used in this thesis. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Revolutionizing video analytics: a review of action recognition using 3D by Jeddah, Yunusa Mohammed, Hassan Abdalla Hashim, Aisha, Khalifa, Othman Omran, Ibrahim, Adamu Abubakar

    Published 2024
    “…As an interdisciplinary field, the 3D video action recognition model interprets human actions in three-dimensional video data using approaches such as pose-based, volumetric, motionbased, and hybrid methods. 3D video action recognition finds application in surveillance, sports analysis, human-computer interaction, healthcare, robotics, and augmented/virtual reality. …”
    Get full text
    Get full text
    Article
  20. 20

    Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof by Yusof, Yusman

    Published 2019
    “…From the reviews, it is evident that autonomous system is set to handle finite number of encountered states using finite sequences of actions. In order to learn the optimized states-action policy the self-learning algorithm is developed using hybrid AI algorithm by combining unsupervised weightless neural network, which employs AUTOWiSARD and reinforcement learning algorithm, which employs Q-learning. …”
    Get full text
    Get full text
    Thesis