Search Results - (( data extraction method algorithm ) OR ( using solution using algorithm ))
Search alternatives:
- extraction method »
- method algorithm »
- using algorithm »
- using solution »
- solution using »
-
1
EEG-and MRI-based epilepsy source localization using multivariate empirical mode decomposition and inverse solution method
Published 2018“…Since MEMD method is a data-driven method which meets the criteria to be applied for EEG processing, therefore this method was employed to extract EEG epileptic spike features. …”
Get full text
Get full text
Thesis -
2
A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat
Published 2021“…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
Get full text
Get full text
Thesis -
3
Fused multivariate empirical mode decomposition (MEMD) and inverse solution method for EEG source localization
Published 2018“…We also developed an unsupervised algorithm utilizing a wavelet method to remove eye blink artifacts. …”
Get full text
Get full text
Article -
4
Fused multivariate empirical mode decomposition (MEMD) and inverse solution method for EEG source localization
Published 2018“…We also developed an unsupervised algorithm utilizing a wavelet method to remove eye blink artifacts. …”
Get full text
Get full text
Get full text
Article -
5
Utilizing artificial bee colony algorithm as feature selection method in Arabic text classification
Published 2023“…In this paper, the filter method chi square and the Artificial Bee Colony) ABC algorithm were both used as FS methods . …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Crow Search Freeman Chain Code (CS-FCC) feature extraction algorithm for handwritten character recognition
Published 2023“…The data representation method employed was Freeman Chain Code (FCC). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
New Cryptographic Algorithms for Enhancing Security of Voice Data
Published 2010“…Finally, the implementation result in this research shows the average time needed to encrypt and decrypt a voice packet size using a proposed algorithm with the long key of 1024-bits is much smaller than AES_Rijndael algorithm with a short key length of 128-bits.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking
Published 2012“…The first contribution is automatic detection of seed points which serve as a prerequisite step for centerline extraction algorithm. The solution consists of an algorithm for automatic collection of candidate seed points using efficient grid line searching mechanism and a validation method which uses local geometric and intensity based features as effective validation rules to discriminate between the actual seed point and false alarms. …”
Get full text
Get full text
Thesis -
9
An improved method in speech signal input representation based on DTW technique for NN speech recognition system
Published 2007“…Another task of the study is to extract pitch features using the Harmonic Filter algorithm. After pitch extraction and linear predictive coefficient (LPC) features fixed to a desired number of frames, speech recognition using neural network can be performed and results showed a very promising solution. …”
Get full text
Get full text
Get full text
Article -
10
Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine
Published 2023“…The SVM algorithm has been used to detect high- and low-density vegetation regions from the extracted ROI. …”
text::Thesis -
11
Agent-based extraction algorithm for computational problem solving
Published 2015“…The tool is used to evaluate the accuracy of the proposed extraction algorithm to extract the appropriate information which are needed. …”
Get full text
Get full text
Thesis -
12
Automated threshold detection for object segmentation in colour image
Published 2016“…Most common solution of the task is the uses of threshold strategy based on trial and error method. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
An efficient IDS using hybrid Magnetic swarm optimization in WANETs
Published 2018“…In order to improve the effectiveness of intrusion detection systems (IDSs), data analysis methods such as data mining and classification methods are often integrated with IDSs. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs
Published 2018“…In order to improve the effectiveness of intrusion detection systems (IDSs), data analysis methods such as data mining and classification methods are often integrated with IDSs. …”
Get full text
Get full text
Article -
15
Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms
Published 2020“…The IEM algorithm uses the attraction-repulsion mechanism to change the positions of solutions towards the optimality. …”
Get full text
Get full text
Thesis -
16
CAT CHAOTIC GENETIC ALGORITHM BASED TECHNIQUE AND HARDWARE PROTOTYPE FOR SHORT TERM ELECTRICAL LOAD FORECASTING
Published 2017“…The solution set (i.e. optimized weight/bias matrix of ANN) provided by the optimized and improved genetic algorithm and modified BP based model is extracted and used in the design and development of a prototype device of the proposed model. …”
Get full text
Get full text
Thesis -
17
APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN
Published 2011“…In our research, extraction pattern from the first module will be fed to this algorithm and is used to make the prediction of named entity candidate category. …”
Get full text
Get full text
Thesis -
18
Long-term electrical energy consumption: Formulating and forecasting via optimized gene expression programming / Seyed Hamidreza Aghay Kaboli
Published 2018“…This merit is provided by balancing the exploitation of solution structure and exploration of its appropriate weighting factors through use of a robust and efficient optimization algorithm in learning process of GEP approach. …”
Get full text
Get full text
Get full text
Thesis -
19
Prognostic Health Management of Pumps Using Artificial Intelligence in the Oil and Gas Sector: A Review
Published 2022“…While the need for selecting appropriate training algorithms is seen to be significant. Interestingly, no specific method or algorithm exists for a given problem instead the solution relies on the type of data and the algorithmâ��s or methodâ��s aptitude for resolving the provided errors. …”
Get full text
Get full text
Article -
20
