Search Results - (( pattern identification based algorithm ) OR ( java application learning algorithm ))
Search alternatives:
- pattern identification »
- identification based »
- application learning »
- learning algorithm »
- java application »
-
1
Statistical computing for forensic firearm pattern identification: Evaluating a fisher linear discriminant analysis-based algorithm against fixed-impulse noise
Published 2025“…Previous studies developed a Fisher Linear Discriminant Analysis (FLDA)-based ballistic identification algorithm to address this limitation, encompassing image pre-processing, feature extraction, and identification. …”
Get full text
Get full text
Get full text
Article -
2
High impedance fault detection and identification based on pattern recognition of phase displacement computation
Published 2018“…Subsequently, an automatic HIF classification algorithm based on predefined indices is proposed to perform event identification and HIF detection. …”
Get full text
Get full text
Article -
3
-
4
Linear-PSO with binary search algorithm for DNA Motif Discovery / Hazaruddin Harun
Published 2015“…Particle Swarm Optimisation (PSO) was selected as the base algorithm that needs improvement and integration with other techniques. …”
Get full text
Get full text
Book Section -
5
Linear-pso with binary search algorithm for DNA motif discovery / Hazaruddin Harun
Published 2015“…Particle Swarm Optimisation (PSG) was selected as the base algorithm that needs improvement and integration with other techniques. …”
Get full text
Get full text
Thesis -
6
EEG EYE STATE IDENTIFICATION BASED ON STATISTICAL FEATURES AND COMMON SPATIAL PATTERN
Published 2019Get full text
Get full text
Final Year Project -
7
The Effect Of Linkages In The Hierarchical Clustering Of Auto-Regressive Algorithm For Defect Identification In Heat Exchanger Tubes
Published 2019“…Pattern recognition approach based on Auto-Regressive (AR) algorithm is an alternative way to provide a more accurate defect identification from stress wave propagated along ASTM A179 heat exchanger tubes. …”
Get full text
Get full text
Get full text
Article -
8
Fsm-Based Enhanced March C- Algorithm For Memory Built-In Self-Test
Published 2017Get full text
Get full text
Thesis -
9
Animal voice recognition for identification (ID) detection system
Published 2011“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
10
Dog voice identification (ID) for detection system
Published 2012“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
11
Acoustic echo cancellation using adaptive filtering algorithms for quranic accents (Qiraat) identification
Published 2015“…Therefore, the AP adaptive algorithm is able to reduce the echo of Quranic accents (Qiraat) signals in a consistent manner against all pattern classification techniques.…”
Get full text
Get full text
Get full text
Article -
12
Register Transfer Level Implementation Of Pooling - Based Feature Extraction For Finger Vein Identification
Published 2017“…The proposed algorithm extracted the local feature information of the finger vein pattern (patches), and used these patches to improve the robustness of the identification. …”
Get full text
Get full text
Thesis -
13
Fpga-Based Accelerator For The Identification Of Finger Vein Pattern Via K-Nearest Centroid Neighbors
Published 2016“…In conclusion, the finger vein identification hardware architecture based on KNCN classifier is successfully implemented on an FPGA board with faster processing time as compared with software-based implementation of KNCN classifier in MATLAB.…”
Get full text
Get full text
Thesis -
14
-
15
An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding
Published 2020“…Sparse representation prevents over-fitting in the classifier by eliminating redundancies and evaluating high-frequency patterns between feature vectors. Performance of proposed methods surpass the classic bag of words algorithm for plant identification tasks.…”
Get full text
Get full text
Get full text
Article -
16
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…In this paper, we introduce an education tool for learning metaheuristic algorithms that allows displaying the convergence speed of the corresponding metaheuristic upon setting/changing the dependable parameters. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
18
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…After evaluating the results of these algorithms, a hybrid Artificial Neural Network-based Imperial Competitive Algorithm (ANN-ICA) was presented in the deployment step of the proposed methodology to identify the structural damage of illustrative structures. …”
Get full text
Get full text
Get full text
Thesis -
19
Improving explicit aspects extraction in sentiment analysis using optimized ruleset / Mohammad Ahmad Jomah Tubishat
Published 2019“…This set of rules includes combination of new created extraction rules with dependency-based rules and pattern-based rules from the previous studies. …”
Get full text
Get full text
Get full text
Thesis -
20
An efficient fuzzy clustering algorithm for mining user session clusters on web log data
Published 2021“…In addition, the methodologies to preprocess the net log data as well as data cleanup client identification and session identification are going to be mentioned. …”
Get full text
Get full text
Get full text
Get full text
Article
