Search Results - (( based evaluation based algorithm ) OR ( text classification matching algorithm ))
Search alternatives:
- classification matching »
- text classification »
- based evaluation »
- evaluation based »
-
1
Non-fiducial based electrocardiogram biometrics with kernel methods
Published 2017“…The effectiveness of this algorithm is investigated by comparing with other AC based feature extraction algorithms involving AC/LDA (Linear Discriminant Analysis) and AC/PCA (Principal Component Analysis). …”
Get full text
Get full text
Thesis -
2
An Ar Natural Marker Similarities Measurement Algorithm For E-Biodiversity
Published 2018“…The objective of this research is to comparatively evaluate the effectiveness of different algorithms, method combination procedure, and their parameters towards classification accuracy. …”
Get full text
Get full text
Proceeding -
3
A new hybrid technique for nosologic segmentation of primary brain tumors / Shafaf Ibrahim
Published 2015“…For this purpose, an algorithm which hybridized the Intensity Based Analysis (IBA), Grey Level Co-occurrence Matrices (GLCM), Adaptive Network-based Fuzzy Inference System (ANFIS) and £article ~warm Optimization (PSO) Clustering Algorithm (CAPSOCA) is proposed. …”
Get full text
Get full text
Thesis -
4
An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding
Published 2020“…Classic bag of visual words algorithm is based on k-means clustering and every SIFT features belongs to one cluster and it leads to decreasing classification results. …”
Get full text
Get full text
Get full text
Article -
5
Optimized image enhancement of colour processing for retinal fundus image
Published 2025“…This approach aims to improve optimization by balancing exploration and exploitation and refining velocity control. The proposed algorithm underwent both qualitative and quantitative evaluations. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Optimized image enhancement of colour processing for retinal fundus image
Published 2025“…This approach aims to improve optimization by balancing exploration and exploitation and refining velocity control. The proposed algorithm underwent both qualitative and quantitative evaluations. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
A new mobile malware classification for call log exploitation
Published 2024journal::journal article -
8
-
9
Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms
Published 2016“…The latest effort to solve this selection problem is the development of the metrics selection model that uses genetic algorithm (GA). However, the process failed to state clearly the encoding strategy in its initial stage. …”
Get full text
Get full text
Thesis -
10
Predicting Cheaters in PlayerUnknown’s Battlegrounds (PUBG) using Random Forest Algorithm
Published 2023“…The primary goal is to use the Random Forest algorithm, an effective machine learning technique, to predict instances of cheating based on the behavioural patterns of participants. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
11
ios Mobile Malware Deep Analysis And Classification For Social Media And Online Banking Exploitation
Published 2024thesis::master thesis -
12
-
13
-
14
Identification of Quran recitation segment from speech video recording / Liliana Nulkasim @ Mohd Kassim
Published 2017“…A random forest classifier algorithm is employed in Spyder IDE using python language as a machine learning language for predict the type of an audio. …”
Get full text
Get full text
Thesis -
15
Converged Classification Network For Matching Cost Computation
Published 2020Get full text
Get full text
Get full text
Article -
16
-
17
-
18
-
19
Android Mobile Malware Classification Based on System Call and Permission Using Tokenization
Published 2024thesis::master thesis -
20
Biometric identification and recognition for iris using failure rejection rate (FRR) / Musab A. M. Ali
Published 2016“…At any process of recognition stage, the biometric data is protected and also whenever there is a compromise to any information in the database it will be on the cancelable biometric template merely without affecting the original biometric information. In order to evaluate and verify the effectiveness of the proposed technique, CASIA-A (version 3.1) and Bath-A iris databases have been selected for performance testing. …”
Get full text
Get full text
Thesis
