Classification of histopathology images of lung cancer using convolutional neural network (CNN)
N Baranwal, P Doravari… - Disruptive Developments in …, 2022 - taylorfrancis.com
Cancer is the uncontrollable cell division of abnormal cells inside the human body, which
can spread to other body organs. It is a non-communicable diseases (NCDs), which account …
can spread to other body organs. It is a non-communicable diseases (NCDs), which account …
Knowledge granularity based incremental attribute reduction for incomplete decision systems
C Zhang, J Dai, J Chen - International Journal of Machine Learning and …, 2020 - Springer
Attribute reduction is an important application of rough set theory. With the dynamic changes
of data becoming more and more common, traditional attribute reduction, also called static …
of data becoming more and more common, traditional attribute reduction, also called static …
Incremental classifier in crime prediction using bi-objective particle swarm optimization
Nowadays, the increase in criminal activities has resulted in a massive generation of crime
reports describing the details of the crime incidents. Analyzing these reports for crime type …
reports describing the details of the crime incidents. Analyzing these reports for crime type …
Accounting and financial management cost accounting integrating rough set knowledge recognition algorithm
X Liu - Discrete Dynamics in Nature and Society, 2022 - Wiley Online Library
The main difference between rough set theory and some methods of uncertainty theory,
such as probabilistic data mining, fuzzy set theory, and evidence‐based data mining, is that …
such as probabilistic data mining, fuzzy set theory, and evidence‐based data mining, is that …
Improved Mispronunciation detection system using a hybrid CTC-ATT based approach for L2 English speakers
N Baranwal, S Chilaka - arXiv preprint arXiv:2201.10198, 2022 - arxiv.org
This report proposes state-of-the-art research in the field of Computer Assisted Language
Learning (CALL). Mispronunciation detection is one of the core components of Computer …
Learning (CALL). Mispronunciation detection is one of the core components of Computer …
A group incremental feature selection based on knowledge granularity under the context of clustering
B Liang, Y Liu, J Lu, H He - International Journal of Machine Learning and …, 2024 - Springer
As a widely used data preprocessing method, feature selection with rough sets aims to
delete redundant conditional features. However, most of the traditional feature selection …
delete redundant conditional features. However, most of the traditional feature selection …
Rough set based incremental crime report labelling in dynamic environment
The proposed work describes a rough set based incremental crime report labelling
technique. The named entities are recognized from the available crime reports to identify the …
technique. The named entities are recognized from the available crime reports to identify the …
Knowledge Granularity Attribute Reduction Algorithm for Incomplete Systems in a Clustering Context
B Liang, E Jin, L Wei, R Hu - Mathematics, 2024 - mdpi.com
The phenomenon of missing data can be seen everywhere in reality. Most typical attribute
reduction models are only suitable for complete systems. But for incomplete systems, we …
reduction models are only suitable for complete systems. But for incomplete systems, we …
Literature on Hand GESTURE Recognition using Graph based methods
N Baranwal, V Sharma - arXiv preprint arXiv:2207.00329, 2022 - arxiv.org
Skeleton based recognition systems are gaining popularity and machine learning models
focusing on points or joints in a skeleton have proved to be computationally effective and …
focusing on points or joints in a skeleton have proved to be computationally effective and …
Privacy in process mining: Logs conversion to images using machine learning algorithm
GK Agordzo, X Fang, J Li - Journal of Intelligent & Fuzzy …, 2023 - content.iospress.com
In today's digital age, log files are crucial. However, the conversion of text log files into
images has only recently been developed. The security of log files is a major source of …
images has only recently been developed. The security of log files is a major source of …