26 results on '"BASHIR, SULAIMON A."'
Search Results
2. Outlier Detection in Multivariate Time Series Data Using a Fusion of K-Medoid, Standardized Euclidean Distance and Z-Score
3. Face Morphing Attack Detection in the Presence of Post-processed Image Sources Using Neighborhood Component Analysis and Decision Tree Classifier
4. Identification of Bacterial Leaf Blight and Powdery Mildew Diseases Based on a Combination of Histogram of Oriented Gradient and Local Binary Pattern Features
5. Change detection for activity recognition
6. Systematic Review on Text Normalization Techniques and its Approach to Non-Standard Words
7. A framework for unsupervised change detection in activity recognition
8. AUTOMATED SHORT ANSWER GRADING USING LONG SHORT-TERM MEMORY OPTIMIZED WITH PARTICLE SWARM OPTIMIZATION.
9. BI-MODAL EMAIL SPAM DETECTION USING RECURRENT AND CONVOLUTION NEURAL NETWORK TECHNIQUES.
10. Implementation of Malaria Parasite Detection and Species Classification Using Dilated Convolutional Neural Network
11. A Framework For Critical Infrastructure Monitoring Based On Deep Reinforcement Learning Approach
12. A Concept-Based Review on Generative Adversarial Network for Generating Super Resolution Medical Image Using SWOT Analysis
13. Edge Computing for Critical Infrastructure Delay Sensitive Applications: Current Trends and Future Directions
14. DEVELOPMENT OF ANOMALY DETECTOR FOR MOTOR BEARING CONDITION MONITORING USING FAST FOURIER TRANSFORM (FFT) AND LONG SHORT TERM MEMORY (LSTM)-AUTOENCODER.
15. A Review on Machine Learning Techniques for Image Based Spam Emails Detection
16. A Review of Dna Cryptograhic Approaches
17. Impact of Pixel Scaling on Classification Accuracy of Dermatological Skin Disease Detection
18. Development of a speech controlled water tap and fan system using linear predictive coefficient for feature extraction
19. COMPARATIVE STUDY OF VARIOUS MACHINE LEARNING ALGORITHMS FOR TWEET CLASSIFICATION
20. PROFILING INAPPROPRIATE USERS' TWEETS USING DEEP LONG SHORT-TERM MEMORY (LSTM) NEURAL NETWORK
21. ANDROID MALWARE CLASSIFICATION USING WHALE OPTIMIZATION ALGORITHM
22. UDetect
23. PROFILING INAPPROPRIATE USERS' TWEETS USING DEEP LONG SHORT-TERM MEMORY (LSTM) NEURAL NETWORK.
24. COMPARATIVE STUDY OF VARIOUS MACHINE LEARNING ALGORITHMS FOR TWEET CLASSIFICATION.
25. ClusterNN
26. The Effect of Window Length on Accuracy of Smartphone-Based Activity Recognition.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.