Search Results - (( opening classification using algorithm ) OR ( using function method algorithm ))

Refine Results
  1. 1

    A review: accuracy optimization in clustering ensembles using genetic algorithms by Ghaemi, Reza, Sulaiman, Md. Nasir, Ibrahim, Hamidah, Mustapha, Norwati

    Published 2011
    “…Next, clustering accuracies among the genetic-guided clustering ensemble algorithms is compared. This paper concludes that using genetic algorithms in clustering ensemble improves the clustering accuracy and addresses open questions subject to future research.…”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Development of a new robust hybrid automata algorithm based on surface electromyography (SEMG) signal for instrumented wheelchair control by Mohd Hanafi, Muhammad Sidik

    Published 2020
    “…This method would be a control method to activate power assist system and selected based on conditions set in the algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    EEG EYE STATE IDENTIFICATION BASED ON STATISTICAL FEATURES AND COMMON SPATIAL PATTERN by WANG, CHIA WOON

    Published 2019
    “…Besides, common spatial pattern (CSP) is the well-known method for classification algorithm in the BCI field. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining. by Saeed, Walid

    Published 2005
    “…The accuracy for rules and classification resulted from the TIP method are compared with other methods such as Standard Integer Programming (SIP) and Decision Related Integer Programming (DRIP) from Rough Set, Genetic Algorithm (GA), Johnson reducer, HoltelR method, Multiple Regression (MR), Neural Network (NN), Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5); all other classifiers that are mostly used in the classification tasks. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Fault classification in smart distribution network using support vector machine by Chuan O.W., Ab Aziz N.F., Yasin Z.M., Salim N.A., Wahab N.A.

    Published 2023
    “…Gaussian radial basis function (RBF) kernel function has been used for training of SVM to accomplish the most optimized classifier. …”
    Article
  6. 6
  7. 7

    Projecting named entity tags from a resource rich language to a resource poor language by Zamin, Norshuhani, Oxley, Alan, Abu Bakar, Zainab

    Published 2012
    “…The method computes the string similarity between the English words and the list of available lexemes in a pre-built lexicon that approximates the best NE mapping.The algorithm has been effectively evaluated using our own terrorism tagged corpus; it achieved satisfactory results in terms of precision, recall, and F-measure.An evaluation of the selected open source NER tool for English is also presented.…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Projecting named entity tags from a resource rich language to a resource poor language by Zamin, N., Oxley, A., Bakar, Z.A.

    Published 2013
    “…This article focuses on the person (PER), organization (ORG) and location (LOC) entities for a Malay journalistic corpus of terrorism. A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism. …”
    Get full text
    Get full text
    Article
  9. 9

    Projecting named entity tags from a resource rich language to a resource poor language by Zamin, N., Oxley, A., Bakar, Z.A.

    Published 2013
    “…This article focuses on the person (PER), organization (ORG) and location (LOC) entities for a Malay journalistic corpus of terrorism. A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism. …”
    Get full text
    Get full text
    Article
  10. 10

    Projecting named entity tags from a resource rich language to a resource poor language by Zamin, N., Oxley, A., Bakar, Z.A.

    Published 2013
    “…This article focuses on the person (PER), organization (ORG) and location (LOC) entities for a Malay journalistic corpus of terrorism. A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism. …”
    Get full text
    Get full text
    Article
  11. 11

    Identification of autism subtypes based on wavelet coherence of BOLD FMRI signals using convolutional neural network by Al-Hiyali, M.I., Yahya, N., Faye, I., Hussein, A.F.

    Published 2021
    “…There are available methods in literature that have used FC patterns as inputs for binary classification models, but the results barely reach an accuracy of 80. …”
    Get full text
    Get full text
    Article
  12. 12

    Identification of autism subtypes based on wavelet coherence of BOLD FMRI signals using convolutional neural network by Al-Hiyali, M.I., Yahya, N., Faye, I., Hussein, A.F.

    Published 2021
    “…There are available methods in literature that have used FC patterns as inputs for binary classification models, but the results barely reach an accuracy of 80. …”
    Get full text
    Get full text
    Article
  13. 13

    Development of electromyography-controlled 3D printed robot hand and supervised machine learning for signal classification by Abdul Wahit, Mohamad Aizat

    Published 2019
    “…The current study of the hand posture classification requires a higher number of EMG sensor used to achieve an accurate classification performance that leads the system to be complicated. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Detecting canopy openings in logged-over forests: a multi-classifier analysis of PlanetScope imagery by Mawlidan, Nurmala, Ismail, Mohd Hasmadi, Gandaseca, Seca, ., Rahmawaty, Yaakub, Nur Faziera

    Published 2024
    “…Three different classification algorithms, namely maximum likelihood classifier (MLC), support vector machine (SVM) and object-based image analysis (OBIA) were used and compared to identify canopy opening areas. …”
    Get full text
    Get full text
    Article
  16. 16

    Waste management using machine learning and deep learning algorithms by Sami, Khan Nasik, Amin, Zian Md Afique, Hassan, Raini

    Published 2020
    “…The model that we have used are the classification models. For our research we did the comparisons between three Machine Learning algorithms, namely Support Vector Machine (SVM), Random Forest, and Decision Tree, and one Deep Learning algorithm called Convolutional Neural Network (CNN), to find the optimal algorithm that best fits for the waste classification solution. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. Finally, both algorithms are validated against the findings in various literatures. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20