Search Results - (( using function path algorithm ) OR ( binary classification tree algorithm ))
Search alternatives:
- binary classification »
- classification tree »
- using function »
- path algorithm »
- tree algorithm »
- function path »
-
1
Design Of Feature Selection Methods For Hand Movement Classification Based On Electromyography Signals
Published 2020“…In this regard, this thesis proposes five FS methods for efficient EMG signals classification. The first method is the Binary Tree Growth Algorithm (BTGA), which implements a hyperbolic tangent function to convert the Tree Growth Algorithm into the binary version. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
EMG Feature Selection And Classification Using A Pbest-Guide Binary Particle Swarm Optimization
Published 2019“…In order to measure the effectiveness of PBPSO, binary particle swarm optimization (BPSO), genetic algorithm (GA), modified binary tree growth algorithm (MBTGA), and binary differential evolution (BDE) were used for performance comparison. …”
Get full text
Get full text
Get full text
Article -
3
Study Of EMG Feature Selection For Hand Motions Classification
Published 2019“…Thus, this paper employs two recent feature selection methods namely competitive binary gray wolf optimizer (CBGWO) and modified binary tree growth algorithm (MBTGA) to evaluate the most informative EMG feature subset for efficient classification. …”
Get full text
Get full text
Get full text
Article -
4
Formulation of invariants for discrete orthogonal moments and image classification / Pee Chih Yang
Published 2013“…Discrete Tchebichef moments are selected as the implementation platform of the proposed algorithms.To evaluate the performance of invariant algorithms, empirical studies have been carried out on large set of binary images which consist of numbers, English letters, symbols, Chinese characters and objects like animals, trees and company logos under noiseless and noisy conditions. …”
Get full text
Get full text
Thesis -
5
An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA
Published 2025“…Traditional machine learning algorithms, such as Decision Trees, Naive Bayes, Random Forest, Random Trees, Multi-Layer Perceptron, and Support Vector Machines, have been extensively applied to address these threats. …”
Get full text
Get full text
Get full text
Thesis -
6
A-star (A*) algorithm implementation for robotics path planning navigation
Published 2018“…This thesis is about the implementation of Astar (A*) algorithm as path planning algorithm used in robotics navigation. …”
Get full text
Get full text
Undergraduates Project Papers -
7
Synthesis of transistor chaining algorithm for CMOS cell layout using euler path / Sukri Hanafiah
Published 1997“…The euler's path it using pseudo input and Heuristic algorithm to find the minimum interlace. …”
Get full text
Get full text
Thesis -
8
Cognitive map approach for mobility path optimization using multiple objectives genetic algorithm
Published 2023Conference Paper -
9
Enhanced Adaptive Neuro-Fuzzy Inference System Classification Method for Intrusion Detection
Published 2024“…Therefore, this binary tree cannot analyse complex features of mixed attributes and restricts the CART tree's deep-level feature recognition ability. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Hybrid path planning for indoor robot with Laplacian Behaviour-based control via four point-explicit group
Published 2014“…Consequently, the gradient of the potential functions would be used by the searching algorithm to generate path from starting to goal location. …”
Get full text
Get full text
Get full text
Article -
11
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2016“…This paper proposes an algorithm frame-work to deal with these false paths through identification for DFT test. …”
Get full text
Get full text
Conference or Workshop Item -
12
Nlfxlms and thf-nlfxlms algorithms for wiener-hammerstein nonlinear active noise control
Published 2016“…However, this assumption may lead to inaccurate secondary path model. In this work, the modelling of acoustic path using FIR filters is incorporated for both algorithms for Wiener-Hammerstein structure. …”
Get full text
Get full text
Thesis -
13
Bayesian random forests for high-dimensional classification and regression with complete and incomplete microarray data
Published 2018“…These problems were extensively studied within the scope of classification (binary and multi-class) and regression (linear and survival). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2017“…This paper proposes an algorithm framework to deal with these false paths through identification for DFT test. …”
Get full text
Get full text
Article -
15
The Development Of A Robust Algorithm For Uav Path Planning In 3d Environment
Published 2016“…Significant research has been conducted on Unmanned Aerial Vehicle (UAV) path planning using evolutionary algorithms, such as Particle Swarm Optimization (PSO), Genetic Algorithm (GA), Differential Evolution (DE), and Biogeographic-Based Optimization (BBO). …”
Get full text
Get full text
Thesis -
16
-
17
Robotic indoor path planning using dijkstra's algorithm with multi-layer dictionaries
Published 2016“…The path computed using the classic Dijkstra's algorithm is the shortest; however, it may not be the most feasible. …”
Get full text
Get full text
Conference or Workshop Item -
18
An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA
Published 2025“…This study investigates the performance of various conventional machine learning algorithms, including decision trees, naive Bayes, naive Bayes trees, random forest, random trees, MLP, and SVM, in detecting network intrusions using binary and multi-classification approaches. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
-
20
Pixel-based feature for android malware family classification using machine learning algorithms
Published 2021Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
