Search Results - (( based evaluation method algorithm ) OR ( binary classification using algorithm ))

Refine Results
  1. 1

    Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier by Siow, Shien Loong

    Published 2018
    “…Classic local binary pattern (LBP) is one of the most useful feature extraction methods. …”
    Get full text
    Get full text
    Monograph
  2. 2

    Design Of Feature Selection Methods For Hand Movement Classification Based On Electromyography Signals by Too, Jing Wei

    Published 2020
    “…In this regard, this thesis proposes five FS methods for efficient EMG signals classification. The first method is the Binary Tree Growth Algorithm (BTGA), which implements a hyperbolic tangent function to convert the Tree Growth Algorithm into the binary version. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Improving amphetamine-type stimulants drug classification using chaotic-based time-varying binary whale optimization algorithm by Draman @ Muda, Azah Kamilah, Mohd Yusof, Norfadzlia, Pratama, Satrya Fajri, Carbo-Dorca, Ramon, Abraham, Ajith

    Published 2022
    “…A new chaotic time-varying binary whale optimization algorithm (CBWOATV) is introduced in this paper to optimize the feature selection process in Amphetamine-type Stimulants (ATS) and non-ATS drugs classification. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Hybrid binary grey Wolf with Harris hawks optimizer for feature selection by Al-Wajih, R., Abdulkadir, S.J., Aziz, N., Al-Tashi, Q., Talpur, N.

    Published 2021
    “…The performance of the proposed hybrid method was compared with Binary Grey Wolf Optimizer (BGWO), Binary Particle Swarm Optimization (BPSO), Binary Harris Hawks Optimizer (BHHO), Binary Genetic Algorithm (BGA) and Binary Hybrid BWOPSO. …”
    Get full text
    Get full text
    Article
  6. 6

    Hybrid Binary Grey Wolf with Harris Hawks Optimizer for Feature Selection by Al-Wajih, R., Abdulkadir, S.J., Aziz, N., Al-Tashi, Q., Talpur, N.

    Published 2021
    “…The performance of the proposed hybrid method was compared with Binary Grey Wolf Optimizer (BGWO), Binary Particle Swarm Optimization (BPSO), Binary Harris Hawks Optimizer (BHHO), Binary Genetic Algorithm (BGA) and Binary Hybrid BWOPSO. …”
    Get full text
    Get full text
    Article
  7. 7

    Hybrid binary grey Wolf with Harris hawks optimizer for feature selection by Al-Wajih, R., Abdulkadir, S.J., Aziz, N., Al-Tashi, Q., Talpur, N.

    Published 2021
    “…The performance of the proposed hybrid method was compared with Binary Grey Wolf Optimizer (BGWO), Binary Particle Swarm Optimization (BPSO), Binary Harris Hawks Optimizer (BHHO), Binary Genetic Algorithm (BGA) and Binary Hybrid BWOPSO. …”
    Get full text
    Get full text
    Article
  8. 8

    An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons by Ghanem, Waheed Ali H. M., Aman, Jantan, Ahmed Ghaleb, Sanaa Abduljabbar, Naseer, Abdullah B.

    Published 2020
    “…This study proposes a new binary classification model for intrusion detection, based on hybridization of Artificial Bee Colony algorithm (ABC) and Dragonfly algorithm (DA) for training an artificial neural network (ANN) in order to increase the classification accuracy rate for malicious and non-malicious traffic in networks. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Selection and optimization of peak features for event-related eeg signals classification / Asrul bin Adam by Asrul, Adam

    Published 2017
    “…At first, a peak classification algorithm is developed based on the general following processes including peak candidate identification, feature extraction, and classification. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Feature Selection Based on Grey Wolf Optimizer for Oil Gas Reservoir Classification by Al-Tashi, Q., Rais, H.M., Abdulkadir, S.J., Mirjalili, S.

    Published 2020
    “…The wrapper K-Nearest Neighbors (KNN) classifier is used to evaluate the selected features. In addition, to examine the efficiency of the proposed method, two recent algorithms namely: Whale Optimization algorithm (WAO) and Dragonfly Algorithm (DA) are implemented for comparison. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Face recognition for varying illumination and different optical zoom using a combination of binary and geometric features by Khalid, Fatimah, Amjeed, Noor, O.K. Wirza, Rahmita Wirza, Madzin, Hizmawati, Azizan, Illiana

    Published 2020
    “…The proposed method consists of five main stages, starting with eye area detection using the developed Viola-Jones algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA by Bian, Hui

    Published 2025
    “…This integration optimizes feature extraction by capturing both spatial and temporal relationships, enhancing the detection of complex network behaviors. Using the NSL-KDD dataset for evaluation, the proposed method demonstrates superior performance compared to conventional algorithms and related deep learning techniques, achieving higher precision, recall, F1 scores and overall accuracy in both binary and multi-class classification tasks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Information Theoretic-based Feature Selection for Machine Learning by Muhammad Aliyu, Sulaiman

    Published 2018
    “…Thus, this thesis precisely developed and evaluated IFS_BACS (Binary Ant Colony System) hybrid method. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Opposition Based Competitive Grey Wolf Optimizer For EMG Feature Selection by Too, Jing Wei, Abdullah, Abdul Rahim

    Published 2020
    “…As for EMG feature selection, the proposed algorithms are evaluated using the EMG data acquired from the publicly access EMG database. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Task-state EEG signal classification for spatial cognitive evaluation based on multiscale high-density convolutional neural network by Wen, Dong, Li, Rou, Tang, Hao, Liu, Yijun, Wan, Xianglong, Dong, Xianling, Saripan, M. Iqbal, Lan, Xifa, Song, Haiqing, Zhou, Yanhong

    Published 2022
    “…In this study, a multi-scale high-density convolutional neural network (MHCNN) classification method for spatial cognitive ability assessment was proposed, aiming at achieving the binary classification of task-state EEG signals before and after spatial cognitive training. …”
    Get full text
    Get full text
    Article
  17. 17

    Development of compound clustering techniques using hybrid soft-computing algorithms by Salim, Naomie, Shamsuddin, Siti Mariyam, Salleh @ Sallehuddin, Roselina, Alwee, Razana

    Published 2006
    “…Previously, there is limited work on the clustering and classification of biologically active compounds into their activity based classes using fuzzy and neural network. …”
    Get full text
    Get full text
    Monograph
  18. 18
  19. 19

    An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA by Hui, Bian, Chiew, Kang Leng

    Published 2025
    “…This study investigates the performance of various conventional machine learning algorithms, including decision trees, naive Bayes, naive Bayes trees, random forest, random trees, MLP, and SVM, in detecting network intrusions using binary and multi-classification approaches. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20