Search Results - (( image classification path algorithm ) OR ( code classification rules algorithm ))
Search alternatives:
- image classification »
- classification rules »
- classification path »
- code classification »
- rules algorithm »
- path algorithm »
-
1
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…This paper presents a classification of android malware using candidate detectors generated from an unsupervised association rule of Apriori algorithm improved with particle swarm optimization to train three different supervised classifiers. …”
Get full text
Get full text
Get full text
Proceeding Paper -
2
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…However, supervised learning technique has limitations for malware classification task. This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. …”
Get full text
Get full text
Get full text
Article -
3
Genetic algorithm fuzzy logic for medical knowledge-based pattern classification
Published 2018“…This research proposed an algorithm named Genetic Algorithm Fuzzy Logic (GAFL) with Pittsburg approach for rules learning and induction in genetic fuzzy system knowledge discovery. …”
Get full text
Get full text
Article -
4
Implementation of vision-assisted path planning system for bulk die sorting in semiconductor industry
Published 2018“…Subsequently, point and coverage path planning algorithms are applied to determine the optimum path for physical die sorting operation. …”
Get full text
Get full text
Conference or Workshop Item -
5
Implementation of vision-assisted path planning system for bulk die sorting in semiconductor industry
Published 2018“…Subsequently, point and coverage path planning algorithms are applied to determine the optimum path for physical die sorting operation. …”
Get full text
Get full text
Conference or Workshop Item -
6
Genetic algorithm fuzzy logic for medical knowledge-based pattern classification
Published 2023“…This research proposed an algorithm named Genetic Algorithm Fuzzy Logic (GAFL) with Pittsburg approach for rules learning and induction in genetic fuzzy system knowledge discovery. …”
Article -
7
Chain coding and pre processing stages of handwritten character image file
Published 2010“…Fuzzy Logic is used in the classification phase while HMM is used in the process of extracting features for the preparation of linguistic variables of the fuzzy rules. …”
Get full text
Get full text
Get full text
Article -
8
Developing and validating a simulation model for counting and classification of vehicles
Published 2016“…An algorithm system approach has been presented for extracting traffic data using video image processing. …”
Get full text
Get full text
Get full text
Article -
9
Learner’s emotion prediction using production rules classification algorithm through brain computer interface tool
Published 2018“…From the data analysis using WEKA software, the production rules classifier (PART) is found to be the most accurate classification algorithm in classifying the emotion which yields the highest precision percentage of 99.6% compared to J48 (99.5%) and Naïve Bayes (96.2%). …”
Get full text
Get full text
Thesis -
10
POWER QUALITY CLASSIFICATION WITH DE-NOISING SCHEME USING WAVELET TRANSFORM AND RULE- BASED METHOD
Published 2012“…Unique features from the I", 4t h ,7th and 8thl evel details are obtained as criteria for developing a Rules-Based Algorithm for classifying disturbances that have occurred. …”
Get full text
Get full text
Thesis -
11
Whale Optimisation Freeman Chain Code (WO-FCC) extraction algorithm for handwritten character recognition
Published 2021“…Finally, the results were compared with the existing proposed Flower Pollination Algorithm (FPA) at the time of FCC extraction. The results show that WOA is a bit better at getting shorter path lengths than FPA in terms of path lengths. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
-
13
Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine
Published 2023“…The proposed vegetation encroachment detection framework used the state-of-art RetinaNet model to identify and locate the power transmission towers from satellite images. A routing algorithm has been developed to create a routing path between all transmission towers in the image, which helps identify the power line path. …”
text::Thesis -
14
Joint routing protocol and image compression algorithm for prolonging node lifetime in wireless sensor network
Published 2018“…The protocol compares the power available on all the paths from source to sink and then selects the path with highest power. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Dual-tone multifrequency signal detection using support vector machines
Published 2023Conference paper -
16
A coverage path planning approach for autonomous radiation mapping with a mobile robot
Published 2023Article -
17
Magnetic resonance imaging sense reconstruction system using FPGA / Muhammad Faisal Siddiqui
Published 2016“…Parallel imaging is a robust method for accelerating the data acquisition in Magnetic Resonance Imaging (MRI). …”
Get full text
Get full text
Get full text
Thesis -
18
Oil Palm Yield Data Collection Using Image Processing
Published 2021“…Autonomous drone also plays a big role in this system as it helps in capturing the images from the oil palm plantation. This area involves techniques such as path finding and stabilising in order to control the drone. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
A YOLO-based deep learning model for Real-Time face mask detection via drone surveillance in public spaces
Published 2024“…The classification task is performed through multi-label classification, wherein each object in an image can belong to multiple classes simultaneously, and the network generates a grid of bounding boxes and corresponding confi dence scores for each class. …”
Get full text
Get full text
Get full text
Article
