Search Results - candidate ((((section algorithm) OR (prediction algorithm))) OR (detection algorithm))
Search alternatives:
-
1
Adaptive DNA computing algorithm by using PCR and restriction enzyme
Published 2004“…By doing this, the molecules which serve as a solution candidate can he narrowcd down and the optimal solution can be detected easily. …”
Get full text
Get full text
Book Section -
2
Breast Cancer Prediction Model Using Machine Learning
Published 2021“…Modelling with machine learning is done by selecting three candidate algorithms, namely Random Forest, Support Vector Machine, and Logistic Regression. …”
Get full text
Get full text
Get full text
Article -
3
Improved fault location on distribution network based on multiple measurements of voltage sags pattern
Published 2012“…A new ranking approach is proposed to overcome multiple faulted section candidates. A large scale 11 kV network which comprises of 43 nodes and 5 branches are used to evaluate the proposed algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Defect green coffee bean detection using image recognition and supervised learning
Published 2022“…Therefore, in this research project, the process will be conducted by using an image classifier with the model of a machine learning algorithm which the candidates comprise of Support Vector Machine, k-Nearest Neighbour and Decision Tree. k-nearest neighbour has the highest F1-score (0.51) than the other two algorithms (Support Vector Machine: 0.50, and Decision Tree: 0.48). …”
Get full text
Get full text
Get full text
Academic Exercise -
5
An Association Rule Mining Approach in Predicting Flood Areas
Published 2016“…Consequently, by using the Apriori algorithm, it generated the 10 best rules with 100% confidence level and 40% minimum support after the candidate generation and pruning technique. …”
Get full text
Get full text
Get full text
Book Section -
6
An effective source number enumeration approach based on SEMD
Published 2022“…Finally, the back propagation (BP) neural network is used to predict the number of sources. Experiment shows that SEMD can effectively restrain the end effect, and the source number enumeration algorithm based on SEMD has a higher correct detection probability than others.…”
Get full text
Get full text
Article -
7
3D face candidate region detection using background subtraction / Zulfikri Paidi and Nurzaid Muhd Zain
Published 2016“…Our focus is to solve the first challenge in face registration, which is to detect and identify face region. From the experiment, it shows some promising results related to using background subtraction in face candidate region detection algorithm. …”
Get full text
Get full text
Get full text
Article -
8
Informative top-k class associative rule for cancer biomarker discovery on microarray data
Published 2020“…This paper proposes an informative top-k class associative rule (iTCAR) method in an integrative framework for identifying candidate genes of specific cancers. iTCAR introduces an enhanced associative classification algorithm that integrates microarray data with biological information from gene ontology, KEGG pathways, and protein-protein interactions to generate informative class associative rules. …”
Get full text
Get full text
Get full text
Article -
9
Informative top-k class associative rule for cancer biomarker discovery on microarray data
Published 2020“…This paper proposes an informative top-k class associative rule ( i TCAR) method in an integrative framework for identifying candidate genes of specific cancers. i TCAR introduces an enhanced associative classification algorithm that integrates microarray data with biological informa- tion from gene ontology, KEGG pathways, and protein-protein interactions to generate informative class associative rules. …”
Get full text
Get full text
Get full text
Article -
10
MicroRNA regulation of human choline kinase gene expression
Published 2019“…MiRNAs binding was predicted by several online computer programs that utilize different algorithms. …”
Get full text
Get full text
Article -
11
Automated face localization and facial features detection using geometric information
Published 2011Get full text
Working Paper -
12
-
13
-
14
Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments
Published 2018“…The fade transitions are detected based on the smoothed moments energy and the moments of gradients correlation for the candidate segments. …”
Get full text
Get full text
Get full text
Thesis -
15
Skin detection using HSV color component subtraction and texture information / Rizal Mat Jusoh and Norhazimi Hamzah
Published 2010“…This thesis presents skin detection algorithm for detecting human skin regions in color images. …”
Get full text
Get full text
Research Reports -
16
-
17
Improvement real-time detection of moving vehicle in a dynamic scene using shadow removal method / Khairul Azman Ahmad, Mohd Halim Mohd Noor,Mohamad Adha Mohamad Idin
Published 2011“…Real-time processing is still feasible as these sophisticated algorithms are applied only a small number of candidates foreground pixels. …”
Get full text
Get full text
Research Reports -
18
Prediction of breast cancer diagnosis using machine learning in Malaysian women
Published 2024“…The three frequently used ML algorithms were deep learning, support vector machine (SVM), and cluster analysis. …”
Get full text
Get full text
Thesis -
19
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
20
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…In this method, features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. Using a number of candidate detectors, the true positive rate of detecting malicious code is maximized, while the false positive rate of wrongful detection is minimized. …”
Get full text
Get full text
Get full text
Proceeding Paper
