• Automatic heart disease prediction using feature selection and data mining techniqueAutomatic heart disease prediction using feature selection and data mining technique

    It can be observed that the performance of CFS and LLCFS achieved the best performance when using a large number of attributes, e.g. 55 for CFS and 57 for LLCFS. Compared with LLCFS, the performance when using CFS is more stable when the number of attributes is larger than 31 with an average of accuracy approximately 86% and an average of AUC ap...

    pdf15 trang | Chia sẻ: huongthu9 | Ngày: 18/08/2021 | Lượt xem: 407 | Lượt tải: 0

  • Pedestrian activity prediction based on semantic segmentation and hybrid of machinesPedestrian activity prediction based on semantic segmentation and hybrid of machines

    In general, this solution brings high accuracy in pedestrian detection as well as pedestrian location and the relative distance between pedestrians and AVs. The combination of image semantic segmentation and pedestrian extraction provides the possibility of accurately predicting the situation, assisting in issuing alerts to AVs. Therefore, our p...

    pdf13 trang | Chia sẻ: huongthu9 | Ngày: 18/08/2021 | Lượt xem: 454 | Lượt tải: 0

  • Gmm for emotion recognition of VietnameseGmm for emotion recognition of Vietnamese

    The paper presents the recognition experiment results for four basic emotions of Vietnamese such as happiness, sadness, neutral, and anger with four different corpora depending on the independence or dependence of the speaker and the content. These experiments were also conducted with six different parameter sets based on the GMM model. The resul...

    pdf18 trang | Chia sẻ: huongthu9 | Ngày: 18/08/2021 | Lượt xem: 533 | Lượt tải: 0

  • A novel algorithm based on trust authentication mechanisms to detect and prevent malicious nodes in mobile ad hoc networkA novel algorithm based on trust authentication mechanisms to detect and prevent malicious nodes in mobile ad hoc network

    We proposed the TAM mechanisms to check preceding node through authenticating hopby-hop all route control packets with three steps: (1) Digital certificates; (2) actual neighbors; and (3) packet integrity. A new protocol named TAMAN, is improved from AODV protocol which can prevent almost of network attack types, such as Blackhole/ Sinkhole, Gray...

    pdf22 trang | Chia sẻ: huongthu9 | Ngày: 18/08/2021 | Lượt xem: 441 | Lượt tải: 0

  • Some new de morgan picture operator triples in picture fuzzy logicSome new de morgan picture operator triples in picture fuzzy logic

    Conjunction operations (fuzzy t-norms) and disjunction operations (fuzzy t-conorms) are basic operators of the fuzzy logics [22, 13]. Picture fuzzy t-norms and picture fuzzy t-conorms firstly were defined and studied in 2015 [6, 9]. In this paper we give some algebraic properties of the picture fuzzy t-norms and the picture fuzzy t-conrms on pic...

    pdf22 trang | Chia sẻ: huongthu9 | Ngày: 18/08/2021 | Lượt xem: 423 | Lượt tải: 0

  • A packet classification algorithm on multi-Way priority trieA packet classification algorithm on multi-Way priority trie

    The article has present the classification of packets in one direction in general and with the Priority trie [9] and JA trie [10] in particular. Based on the analysis of the advantages and disadvantages of each structure, we proposed a new packet classification algorithm based on Multi Way Priority {MWP trie structure. The accuracy of the algorit...

    pdf15 trang | Chia sẻ: huongthu9 | Ngày: 18/08/2021 | Lượt xem: 454 | Lượt tải: 0

  • Characterizations for several classes of alternative codesCharacterizations for several classes of alternative codes

    The purpose of this paper was to deal with the development of the class of alternative codes. Four new classes of codes, which are subclasses of alternative codes, were introduced and considered. Some characteristics and relationships of these classes were proposed (Theorems 1-4). One of them provided us with a tool to check whether a given alter...

    pdf11 trang | Chia sẻ: huongthu9 | Ngày: 18/08/2021 | Lượt xem: 436 | Lượt tải: 0

  • Some algorithms related to consistent decision tableSome algorithms related to consistent decision table

    In this paper, we proposed some novel algorithms to find an object reduct and an attribute reduct of consistent decision table and proved correctness of the algorithms. Based on this result, we can apply some machine learning methods such as learning decision rules or learning decision trees in an effective way. In addition, combination of attri...

    pdf12 trang | Chia sẻ: huongthu9 | Ngày: 18/08/2021 | Lượt xem: 423 | Lượt tải: 0

  • Hedges algebras and fuzzy partition problem for qualitative attributesHedges algebras and fuzzy partition problem for qualitative attributes

    Hedge algebra, a new and quite effective tool, can be used instead of the fuzzy theory in many cases due to the order structure on the set of natural language elements. This paper demonstrates this trend through the method of building the membership function to split fuzzy item sets in the fuzzy data mining problem. This is an important step tha...

    pdf16 trang | Chia sẻ: huongthu9 | Ngày: 18/08/2021 | Lượt xem: 398 | Lượt tải: 0

  • Content based image retrieval using multiple features and pareto approachContent based image retrieval using multiple features and pareto approach

    This article formalizes properties of Pareto fronts in the search space in CBIR systems using multi features. The proposal carries out an efficiency for the classification engine. The Pareto method overcomes entanglements when CBIR systems use classification engine dealing with less labeled samples and real-time training data. It also overcome...

    pdf19 trang | Chia sẻ: huongthu9 | Ngày: 18/08/2021 | Lượt xem: 553 | Lượt tải: 0