Search Results - (( gram extraction methods algorithm ) OR ( parallel optimization path algorithm ))

  • Showing 1 - 16 results of 16
Refine Results
  1. 1

    Tool path generation of contour parallel based on ant colony optimisation by Abdullah, Haslina, Ramli, Rizauddin, Abd Wahab, Dzuraidah, Abu Qudeiri, Jaber

    Published 2016
    “…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4
  5. 5

    Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib by Dian Najihah , Abu Talib

    Published 2019
    “…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors by Lee, Weng Fook

    Published 2008
    “…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
    Get full text
    Thesis
  7. 7

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…The method employs Semantic Tags Extraction (STSE) algorithm to extract semantic tags of an element and Element Enrichment (EERM) algorithm to enrich the elements. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Reduced Set Kernel Principal Component Analysis (Rskpca) Algorithm for Palm Print Based Mobile Biometric System by Ibrahim, Noor Salwani

    Published 2015
    “…A new approach in feature extraction called Reduced-Set Kernel Principal Component Analysis (RSKPCA) is proposed to speed up the processing in feature extraction. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Intelligent deep machine learning cyber phishing URL detection based on BERT features extraction by Muna Elsadig, Ashraf Osman Ibrahim Elsayed, Shakila Basheer, Manal Abdullah Alohali, Sara Alshunaifi, Haya Alqahtani, Nihal Alharbi, Wamda Nagmeldin

    Published 2022
    “…Next, a deep convolutional neural network method was utilised to detect phishing URLs. It was used to constitute words or n-grams in order to extract higher-level features. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks by Chien, Stephen Lim Een, Raja Maamor Shah, Raja Noor Farah Azura, Othman, Mohamed

    Published 2016
    “…A tree visualisation was constructed based on its connectivity to enable the generation of formulae for optimal diameter and average optimal path lengths. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Improvement on rooftop classification of worldview-3 imagery using object-based image analysis by Norman, Masayu

    Published 2019
    “…Therefore, the LiDAR derived data were combined with WV-3 image using different fusion methods such as layer stacking (LS), Gram–Schmidt (GS), and PC spectral sharpening (PCSS). …”
    Get full text
    Get full text
    Thesis
  13. 13

    Online teleoperation of writing manipulator through graphics processing unit based accelerated stereo vision by Abu Raid, Fadi Imad Osman

    Published 2021
    “…These algorithms are then parallelized using Compute Unified Device Architecture CUDA C language to run on Graphics Processing Unit GPU for hardware acceleration. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Prediction of cause of death from forensic autopsy reports using text classification techniques: A comparative study by Mujtaba, Ghulam, Shuib, Liyana, Raj, Ram Gopal, Rajandram, Retnagowri, Shaikh, Khairunisa

    Published 2018
    “…Methods: For experiments, the autopsy reports belonging to eight different causes of death were collected, preprocessed and converted into 43 master feature vectors using various schemes for feature extraction, representation, and reduction. …”
    Get full text
    Get full text
    Article
  15. 15

    DC-based PV-powered home energy system by Sabry, Ahmad H.

    Published 2017
    “…A controller based on an algorithm of one time maximum power point (MPP) is proposed to mitigate those losses. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Semi-supervised learning for sentiment classification with ensemble multi-classifier approach by Aribowo, Agus Sasmito, Basiron, Halizah, Abd Yusof, Noor Fazilla

    Published 2022
    “…The research went through pre-processing, vectorization, and feature extraction using TF-IDF and n-grams. Support Vector Machine (SVM) or Random Forest for tokenization was used to separate unigram, bigram, and trigram in model generation. …”
    Get full text
    Get full text
    Get full text
    Article