Search Results - (( based constructive method algorithm ) OR ( set extraction method algorithm ))
Search alternatives:
- based constructive »
- extraction method »
- method algorithm »
- set extraction »
-
1
Non-fiducial based electrocardiogram biometrics with kernel methods
Published 2017“…The effectiveness of this algorithm is investigated by comparing with other AC based feature extraction algorithms involving AC/LDA (Linear Discriminant Analysis) and AC/PCA (Principal Component Analysis). …”
Get full text
Get full text
Thesis -
2
Opposition Based Competitive Grey Wolf Optimizer For EMG Feature Selection
Published 2020“…Initially, several useful features are extracted from the EMG signals to construct the feature set. …”
Get full text
Get full text
Get full text
Article -
3
Using algorithmic taxonomy to evaluate lecturer workload
Published 2006“…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Get full text
Article -
4
-
5
Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal
Published 2006“…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Conference or Workshop Item -
6
A genetic algorithm based fuzzy inference system for pattern classification and rule extraction
Published 2023“…This paper presents a genetic-algorithm-based fuzzy inference system for extracting highly comprehensible fuzzy rules to be implemented in human practices without detailed computation (hereafter denoted as GA-FIS). …”
Article -
7
Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal
Published 2006“…Lecturer workload at universities includes three major categories: teaching, research and services.Teaching workload is influence by various factors such as level taught courses, number of student, credit and contact hour and off campus or on campus course design.The UPM has a KM Portal that contains sets of metadata on lecturer profile and knowledge assets.The Lecturer profile contains information lecturer teaching, research, publication and many more.We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload.This method measures the lecturer teaching workload.The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset.Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Identifying Students' Summary Writing Strategies Using Summary Sentence Decomposition Algorithm
Published 2011“…We first analyzed experts' written summaries, extracted the strategies used in the summaries, formulated a set of heuristics rules to define the strategies and finally transformed the rules using position-based method into summary sentence decomposition algorithm (SSDA). …”
Get full text
Get full text
Get full text
Article -
9
A hybrid approach for personalized news recommendation with ordered clustering algorithm, rich user and news metadata
Published 2019“…In recent years, there has been much focus on the design and development of personalized news recommendation systems that observe and learn user behavior and generate news set based on this behavior. Commonly, the current news recommendation systems employ the collaborative filtering-based (CF-based), Content-based filtering (Content-based) or hybrid methods. …”
Get full text
Get full text
Thesis -
10
Machine learning in botda fibre sensor for distributed temperature measurement
Published 2023“…An alternative method is proposed, utilizing machine learning algorithms. …”
text::Thesis -
11
Transmission lines modelling based on RLC passive and active filter design
Published 2017“…This research proposes a new method for modelling the transmission line based on a rational approximation function which can be extracted through the Vector Fitting (VF) method, based on the frequency response measured data points. …”
Get full text
Get full text
Get full text
Article -
12
Image watermarking optimization algorithms in transform domains and feature regions
Published 2012“…As a result,it will first introduce the theories about the feature extraction and the basic principles on how feature points can act as locating resynchronization between watermark insertion and extraction discussed in detail.Subsequently,it will present several content-based watermark embedding and extraction methods which can be directly implemented based on the synchronization scheme.Further detailed watermarking schemes which combine feature regions extraction with counter propagation neural network-based watermarks synapses memorization are then presented.The performance of watermarking schemes based on framework of feature point shows the following advantages:a)Good imperceptibility. …”
Get full text
Get full text
Thesis -
13
Classification of stock market index based on predictive fuzzy decision tree
Published 2005“…After constructing predictive FDT, Weighted Fuzzy Production Rules (WFPRs) are extracted from predictive FDT, and then more significant WFPR’s are mined by using similarity-based fuzzy reasoning method. …”
Get full text
Get full text
Thesis -
14
Heuristic optimization-based wave kernel descriptor for deformable 3D shape matching and retrieval
Published 2018“…This paper presents an optimized wave kernel signature (OWKS) using a modified particle swarm optimization (MPSO) algorithm. The variance parameter and its setting mode play a central role in this kernel. …”
Get full text
Get full text
Article -
15
Heuristic optimization-based wave kernel descriptor for deformable 3D shape matching and retrieval
Published 2018“…This paper presents an optimized wave kernel signature (OWKS) using a modified particle swarm optimization (MPSO) algorithm. The variance parameter and its setting mode play a central role in this kernel. …”
Get full text
Get full text
Article -
16
EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique
Published 2016“…Thus, this research aims to design an Incremental FRNN (IncFRNN) technique for person authentication modelling using feature extracted EEG signals from VEP electrodes. The IncFRNN algorithm updates the training set by employing a heuristic update method to maintain representative objects and eliminate rarely used objects. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
-
18
Self learning neuro-fuzzy modeling using hybrid genetic probabilistic approach for engine air/fuel ratio prediction
Published 2017“…An enhanced hybrid Genetic Algorithm based Fuzzy Bayesian classifier (GA-FBC) was proposed to help the NFS in the rule extraction. …”
Get full text
Get full text
Get full text
Thesis -
19
Evaluation of intonation features on emphasized Malay words / Syazwani Nasaruddin
Published 2017“…Activities in this section are, for testing part, 314 words from 2 different speakers are evaluated by using clustering method. WEKA is a set of machine learning algorithm for data mining task. …”
Get full text
Get full text
Thesis -
20
Classification with degree of importance of attributes for stock market data mining
Published 2004“…We extend this idea with the expressive power of fuzzy reasoning method. After constructing predictive FDT, weighted fuzzy production rules (WFPRs) can be extracted from predictive FDT. …”
Get full text
Get full text
Article
