Search alternatives:
features detection » feature selection (Expand Search), signatures detection (Expand Search)
Showing 1 - 7 results of 7 for search 'binary features detection algorithm', query time: 0.05s Refine Results
  1. 1
  2. 2

    Type 2 Diabetes Mellitus Automated Risk Detection Based on UAE National Health Survey Data: A Framework for the Construction and Optimization of Binary Classification Machine Learn... by Mohamed, AlShuweihi

    Published 2020
    “…LR with the reduced feature set using the intersection between CS and RFE proved to be the best model among the tested algorithms. …”
    Get full text
  3. 3

    A Digital DNA Sequencing Engine for Ransomware Analysis using a Machine Learning Network by KHAN, FIROZ

    Published 2020
    “…The preprocessing of data includes remove missing value records and remove columns that have a negligible impact. The feature selection uses Grey Wolf Optimisation and Binary Search algorithms for choosing the best features out of the dataset. …”
    Get full text
  4. 4

    Retinal imaging based glaucoma detection using modified pelican optimization based extreme learning machine by Debendra Muduli (20748758)

    Published 2024
    “…For mass fundus image-based glaucoma classification, an improved automated computer-aided diagnosis (CAD) model performing binary classification (glaucoma or healthy), allowing ophthalmologists to detect glaucoma disease correctly in less computational time. …”
  5. 5
  6. 6

    VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems by Hisham A. Kholidy (18891802)

    Published 2019
    “…However, NNGE algorithm tends to produce rules that test a large number of input features. …”
  7. 7

    Developing a framework for using face recognition in transit payment transactions by HABEH, ORABI MOHAMMAD ABDULLAH

    Published 2021
    “…On the other hand, a tremendous advancement has been noticed in the human face detection and recognition technology which mainly used to authenticate and identify person face from a group of people through detecting a unique feature of the face and ignore the background image then compare the outcomes with the registered faces in the database to identify the person. …”
    Get full text