Search Results - (( software extraction method algorithm ) OR ( using function method algorithm ))
Search alternatives:
- software extraction »
- extraction method »
- method algorithm »
- function method »
- using function »
-
1
Utilizing artificial bee colony algorithm as feature selection method in Arabic text classification
Published 2023“…In this paper, the filter method chi square and the Artificial Bee Colony) ABC algorithm were both used as FS methods . …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Jogging activity recognition using k-NN algorithm
Published 2022“…To recognize and classify the level of jogging intensity, k-Nearest Neighbours (k-NN) algorithms will be considered as a machine learning method. …”
Get full text
Get full text
Get full text
Academic Exercise -
3
Hybrid subjective evaluation method using weighted subsethood - based (WSBA) rule generation algorithm
Published 2013“…The use of fuzzy rules, which were extracted directly from input data through Weighted Subsethood-based (WSBA) Rule Generation Algorithm.WSBA rule generation use the subsethood values to generate the weights which finally produced the fuzzy general rules.The rules generated through the data provided knowledge in developed fuzzy rule The fuzzy rules embedded in the framework of subjective evaluation method showed advantages in generalizing the evaluation of the performance achievement, where the evaluation process can be conducted consistently in producing good evaluation results with the use of the membership set score.The results from the numerical examples are comparable to other fuzzy evaluation methods, even with the use of small rule size.…”
Get full text
Get full text
Get full text
Article -
4
Hybrid subjective evaluation of rule Exraction Algorithm using Weighted Subsethood-Based (WSBA)
Published 2013“…Fuzzy rules are important elements that being highlighted in any fuzzy expert system.This research proposes the framework of subjective performance evaluation using fuzzy technique for ranking the performance of the financial performance of a company under a multi criteria environment.There are a lot of techniques used such as fuzzy similarity function, fuzzy synthetic decision and satisfaction function have been adopted.The framework is based on fuzzy multi-criteria decision-making that consists of fuzzy rules.The use of fuzzy rules, which were extracted directly from input data through Weighted Subsethood-based (WSBA) Rule Generation Algorithm.WSBA rule generation use the subsethood values to generate the weights which finally produced the fuzzy general rules.The rules generated through the data provided knowledge in developed fuzzy rule The fuzzy rules embedded in the framework of subjective evaluation method showed advantages in generalizing the evaluation of the performance achievement, where the evaluation process can be conducted consistently in producing good evaluation results with the use of the membership set score.The results from the numerical examples are comparable to other fuzzy evaluation methods, even with the use of small rule size.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A study on component-based technology for development of complex bioinformatics software
Published 2004“…The second layer uses discriminative SVM algorithm with a state-of-the-art string kernel based on PSI-BLAST profiles that is used to leverage the unlabeled data. …”
Get full text
Get full text
Monograph -
6
Predictive Maximum Power Point Tracking for Proton Exchange Membrane Fuel Cell System
Published 2021“…All simulations were performed using MATLAB software to show the power characteristics extracted from the PEMFC system. …”
Get full text
Get full text
Get full text
Article -
7
Image clustering comparison of two color segmentation techniques
Published 2010“…There are many algorithm for analysing clustering each having its own method to do clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. …”
Get full text
Get full text
Get full text
Article -
9
Real-time vision-based Malaysian road sign recognition using an artificial neural network / Kh Tohidul Islam
Published 2017“…All these algorithms are tested using thousands of images. The hybrid color segmentation algorithm has eventually been chosen for this proposed system as it shows the best performance for detection of road signs. …”
Get full text
Get full text
Get full text
Thesis -
10
Analysis of Traffic Accident Patterns Using Association Rule Mining
Published 2024“…This study analyzed the levels of minor, moderate, and severe traffic accidents in the Palembang Police area from 2015 to 2020 using association rule mining and the apriori algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Recommendation System Model For Decision Making in the E-Commerce Application
Published 2024thesis::doctoral thesis -
12
FEATURES EXTRACTION OF HEP-2 IMMUNOFLUORESCENCE PATTERNS BASED ON TEXTURE AND REGION OF INTEREST TECHNIQUES
Published 2013“…Image segmentation will be done after pre-processing completed to further enhance the image according to its edge or region to be used for the input image. Different methods of features extraction will be used and compared for better outcome. …”
Get full text
Get full text
Final Year Project -
13
Segmenting the right ventricle cavity from 4D echocardiography images for stroke volume measurement
Published 2014“…All of these methods focused on a manual or semi-automatic extraction of the RV structure. …”
Get full text
Get full text
Thesis -
14
-
15
Register Transfer Level Implementation Of Pooling - Based Feature Extraction For Finger Vein Identification
Published 2017“…The result showed an outstanding speed improvement compared to software implementation. The time consumed by the hardware for extracting the features of one image was 310X time faster than the consumed time for software implementation. …”
Get full text
Get full text
Thesis -
16
Whale Optimisation Freeman Chain Code (WO-FCC) extraction algorithm for handwritten character recognition
Published 2021Get full text
Get full text
Get full text
Conference or Workshop Item -
17
-
18
-
19
Crow Search Freeman Chain Code (CS-FCC) feature extraction algorithm for handwritten character recognition
Published 2023Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
