Search Results - (( control classification based algorithm ) OR ( parallel optimization path algorithm ))
Search alternatives:
- control classification »
- parallel optimization »
- classification based »
- optimization path »
- path algorithm »
-
1
Tool path generation of contour parallel based on ant colony optimisation
Published 2016“…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
Get full text
Get full text
Article -
2
Minimizing machining airtime motion with an ant colony algorithm
Published 2016Get full text
Get full text
Article -
3
-
4
Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib
Published 2019“…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
Get full text
Get full text
Get full text
Thesis -
5
Non-invasive pathological voice classifications using linear and non-linear classifiers
Published 2010“…The experiment investigations elucidate that the proposed feature extraction algorithms give very promising classification accuracy for the classification of normal and pathological voices under controlled and noisy environment. …”
Get full text
Thesis -
6
Inversed Control Parameter in Whale Optimization Algorithm and Grey Wolf Optimizer for Wrapper-Based Feature Selection: A Comparative Study
Published 2023“…This comparative study aims to investigate and compare the effectiveness of the inversed control parameter in the proposed methods against the original algorithms in terms of the number of selected features and the classification accuracy. …”
Get full text
Get full text
Article -
7
Inversed Control Parameter in Whale Optimization Algorithm and Grey Wolf Optimizer for Wrapper-Based Feature Selection: A Comparative Study
Published 2023“…This comparative study aims to investigate and compare the effectiveness of the inversed control parameter in the proposed methods against the original algorithms in terms of the number of selected features and the classification accuracy. …”
Get full text
Get full text
Article -
8
-
9
-
10
Weed recognition based on erosion and dilation segmentation algorithm
Published 2009“…The algorithm is based on erosion followed by dilation segmentation algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Therefore, this paper presents a new mobile botnet classification based on permission and Application Programming Interface (API) calls in the smartphone. …”
Proceedings Paper -
12
Detection and classification of conflict flows in SDN using machine learning algorithms
Published 2021“…The EFDT and hybrid DT-SVM algorithms were designed and deployed based on DT and SVM algorithms to achieve improved performance. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
13
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
14
Classification of gait parameters in stroke with peripheral neuropathy (PN) by using k-Nearest Neighbors (kNN) algorithm / N. Anang ...[et al.]
Published 2018“…This paper presents the gait pattern classification between 3 groups which are control, stroke only and stroke with Peripheral Neuropathy (SPN) using k-Nearest Neighbors (kNN) algorithm. …”
Get full text
Get full text
Get full text
Article -
15
-
16
A Novel Wrapper-Based Optimization Algorithm for the Feature Selection and Classification
Published 2023“…Moreover, K-Nearest Neighbor (KNN) classifier was used to evaluate the effectiveness of the features identified by the proposed SCSO algorithm. The performance of the proposed SCSO algorithm was compared with six state-of-the-art and recent wrapper-based optimization algorithms using the validation metrics of classification accuracy, optimum feature size, and computational cost in seconds. …”
Get full text
Get full text
Article -
17
Android Mobile Malware Classification Based on System Call and Permission Using Tokenization
Published 2024thesis::master thesis -
18
A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors
Published 2008“…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
Get full text
Thesis -
19
-
20
Hevea leaf features extraction and recognition algorithm for hevea clones classification using image / Mohamad Faizal Ab Jabal, Suhardi Hamid, Salehuddin Shuib
Published 2013“…Final result produced by the algorithm is 92.312% of average accuracy and the classification for the leaf was based on the leaf-shape information.…”
Get full text
Get full text
Research Reports
