Search Results - (( using vector method algorithm ) OR ( basic classification based algorithm ))
Search alternatives:
- basic classification »
- classification based »
- method algorithm »
- vector method »
-
1
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
Published 2022“…Due to the complexity of TLS traffic decryption, several anomaly-based detection studies have been conducted to detect TLS-based malware using different features and machine learning (ML) algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Rough Neural Networks Architecture For Improving Generalization In Pattern Recognition
Published 2004“…A novel feature extraction algorithm was developed to extract the feature vectors. …”
Get full text
Get full text
Thesis -
3
-
4
Mean of correlation method for optimization of affective states detection in children
Published 2018“…This paper proposes an effective algorithm of texture analysis based on novel technique using Gray Level Co-occurrence Matrix approach to be applied so as to identify blood-flow region. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Text classification using Naive Bayes: An experiment to conference paper
Published 2005“…The basic text classification technique in forum application has been discussed in Sainin (2005a) and Sainin (2005b).The paper explains about the use of the basic naïve Bayes algorithm to classify forum text me ssages into two classes namely clean and bad. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Hevea leaf features extraction and recognition algorithm for hevea clones classification using image / Mohamad Faizal Ab Jabal, Suhardi Hamid, Salehuddin Shuib
Published 2013“…Final result produced by the algorithm is 92.312% of average accuracy and the classification for the leaf was based on the leaf-shape information.…”
Get full text
Get full text
Research Reports -
7
Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks
Published 2024“…This scheme incorporates machine learning techniques by utilizing Support Vector Machine (SVM) and K-Nearest Neighbors (KNN) classification algorithms to accurately identify and handle malicious network traffic following the initial packet filtration process that identifies abnormal traffic. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
-
9
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…For example, in video compression, the use of motion vectors on individual macro-blocks optimized the motion vector information. …”
Get full text
Get full text
Get full text
Book Chapter -
10
-
11
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…Therefore, this research has designed fuzzy learning algorithm that is able to classify fruits based on their shape and size features using Harumanis dataset. …”
Get full text
Get full text
Thesis -
12
-
13
Face recognition using eigenfaces and smooth support vector machine
Published 2011“…The eigenfaces is projected onto human faces to identify the features vector. These significant features vector are further refine using Gaussian kernel. …”
Get full text
Get full text
Undergraduates Project Papers -
14
An application of genetic algorithm and least squares support vector machine for tracing the transmission loss in deregulated power system
Published 2011“…This paper proposes a new method to trace the transmission loss in deregulated power system by applying Genetic Algorithm (GA) and Least Squares Support Vector Machine (LS-SVM). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
The influence of sentiments in digital currency prediction using hybrid sentiment-based Support Vector Machine with Whale Optimization Algorithm (SVMWOA)
Published 2021“…Support Vector Machine (SVM) technique is used with the Whale Optimization Algorithm (WOA) which is inspired by the swarm optimization algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…This paper presents an intelligent system to reduce Non Technical Loss (NTL) using hybrid Support Vector Machine (SVM) and Genetic Algorithm (GA). …”
Conference Paper -
17
Classification of herbs plant diseases via hierarchical dynamic artificial neural network
Published 2010“…This paper is to propose an unsupervised diseases pattern recognition and classification algorithm that is based on a modified Hierarchical Dynamic Artificial Neural Network which provides an adjustable sensitivity-specificity herbs diseases detection and classification from the analysis of noise-free colored herbs images. …”
Get full text
Get full text
Article -
18
Smoothed functional algorithm with norm-limited update vector for identification of continuous-time fractional-order Hammerstein Models
Published 2024“…This article proposes an identification method of continuous-time fractional-order Hammerstein model using smoothed functional algorithm with a norm-limited update vector (NL-SFA). …”
Get full text
Get full text
Get full text
Article -
19
A Method For Solving Mult-Objective Optimization Problem: Vector Evaluated Genetic Algorithm (Vega)
Published 2009“…However, it is impractical to solve MOOP by using classical methods due to its complexity. Genetic Algorithms (GAs) are a powerful stochastic search in solving optimization problems. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
20
A Study On The Effects Of Noise Level, Cleaning Method, And Vectorization Software On The Quality Of Vector Data.
Published 2007“…Noisy images are cleaned by six cleaning algorithms and then three different commercial raster to vector software are used to vectorize the cleaned images. vector Recovery Index (VRI) is the performance evaluation criteria used in this study to judge the quality of the resulting vectors compared to their ground truth data. …”
Get full text
Get full text
Conference or Workshop Item
