Search Results - (( framework implementation using algorithm ) OR ( based evaluation method algorithm ))
Search alternatives:
- framework implementation »
- implementation using »
- evaluation method »
- based evaluation »
- method algorithm »
- using algorithm »
-
1
Genetic algorithm based ensemble framework for sentiment analysis
Published 2018“…Methods of feature extraction can be separated into word based and phrase based. …”
Get full text
Get full text
Thesis -
2
Edge assisted crime prediction and evaluation framework for machine learning algorithms
Published 2022“…In particular, this study proposes a crime prediction and evaluation framework for machine learning algorithms of the network edge. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Development of an Automated Technique for Reconstructing Jawi Characters in Historical Documents
Published 2007“…The algorithms have been implemented using Matlab software version 6.5. …”
Get full text
Get full text
Thesis -
4
Disparity map algorithm using hierarchical of bitwise pixel differences and segment-tree from stereo image
Published 2024“…The algorithm development can be categorized into local, global, and semi-global methods. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Simulated Kalman Filter algorithms for solving optimization problems
Published 2019“…The proposed population-based SKF algorithm and the single solution-based SKF algorithm use the scalar model of discrete Kalman filter algorithm as the search strategy to overcome these flaws. …”
Get full text
Get full text
Thesis -
6
Multi-sensor fusion based on multiple classifier systems for human activity identification
Published 2019“…To provide compact feature vector representation, we studied hybrid bio-inspired evolutionary search algorithm and correlation-based feature selection method and evaluate their impact on extracted feature vectors from individual sensor modality. …”
Get full text
Get full text
Article -
7
Design and Implementation of a Genetic Algorithm-Based Block Cipher For Enhanced Cryptographic Security
Published 2025conference output::conference proceedings::conference paper -
8
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. …”
Get full text
Get full text
Thesis -
9
Recommendation System Model For Decision Making in the E-Commerce Application
Published 2024thesis::doctoral thesis -
10
The Parallel Fuzzy C-Median Clustering Algorithm Using Spark for the Big Data
Published 2024“…A comparative study is done to validate the proposed algorithm by implementing the other contemporary algorithms for the same dataset. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Context enrichment framework for sentiment analysis in handling word ambiguity resolution
Published 2024“…The similarity between ambiguous words and their context words is evaluated using the cosine similarity approach. A rule-based method is introduced to select context words based on their similarity. …”
Get full text
Get full text
Thesis -
12
Using genetic algorithms to optimise land use suitability
Published 2012“…In this study, under environmentfriendliness objective, based on multi-agent genetic algorithms, was developed a geospatial model for the land use allocation. …”
Get full text
Get full text
Thesis -
13
An Artificial Intelligence-Based Knowledge Management System for Outcome-Based Education Implementing in Higher Education Institutions
Published 2025“…Recommendation system on learning analysis was implemented in a hybrid algorithm combines Rule-based and Content-based filtering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Using artificial intelligence search in solving the camera placement problem
Published 2022“…Two case studies are used to evaluate those algorithms, and the camera placement problem is formulated as a coverage maximization problem. …”
Get full text
Get full text
Book -
15
Sub-route reversal repair mechanism and differential evolution for urban transit network design problem
Published 2017“…From the literature of UTNDP, the most widely used metaheuristic is the genetic algorithm, at the expense of other population-based metaheuristics. …”
Get full text
Get full text
Thesis -
16
The conceptual framework of knowledge of large scale and incomplete graphs of skyline queries optimization using machine learning
Published 2025“…The implemented algorithm to perform such operation was far more efficient, faster and accurate as compared to conventional methods. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. …”
Get full text
Get full text
Get full text
Article -
18
User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Published 2023“…Secondly, a questionnaire prepared to examine the acceptance and use of EPSB. Finally, the implemented algorithm tested by comparing the accuracy of the current authentication framework with and without an EPSB algorithm. …”
text::Thesis -
19
Revolutionizing video analytics: a review of action recognition using 3D
Published 2024“…It also addresses the practicalities of implementing action recognition algorithms in real-world situations, which include tools like deep learning frameworks, pre-trained models, open-source libraries, cloud services, GPU acceleration, and evaluation metrics. …”
Get full text
Get full text
Article -
20
Applications of contemporary artificial intelligence technology in forensic odontology as primary forensic identifier : A scoping review
Published 2022“…Objective: This article aims to evaluate current artificial intelligence applications and discuss their performance concerning the algorithm architecture used in forensic odontology. …”
Get full text
Get full text
Get full text
Article
