Search Results - (( topic identification using algorithm ) OR ( using function based algorithm ))
Search alternatives:
- topic identification »
- identification using »
- using algorithm »
- using function »
-
1
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…The algorithm simulates two important tasks that are frequently used by the human experts to identify summarizing strategies used to produce the summary sentences: 1) sentences relevance identification; and 2) summarizing strategies identification. …”
Get full text
Get full text
Thesis -
2
Speech processing for makhraj recognition (design adaptive filter for noise removal)
Published 2010“…Least Mean Square (LMS) Algorithm based on Adaptive Filter technique is used to remove noise. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Angle Based Protein Tertiary Structure Prediction Using Bees Optimization Algorithm
Published 2010“…In this project, angles based control with Bees Optimization search algorithm were adopted to search with guidance the protein conformational space in order to find the optimum solution. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Application of Optimization Methods for Solving Clustering and Classification Problems
Published 2011“…This method does not explicitly use derivatives, and is particularly appropriate when functions are non-smooth. …”
Get full text
Get full text
Thesis -
5
Topic identification using filtering and rule generation algorithm for textual document
Published 2015“…Most existing topic identification methods depend on occurrence of terms in the text. …”
Get full text
Get full text
Get full text
Thesis -
6
A Study of the Contribution of Nearest-Neighbour Thermodynamic Parameters to the DNA Sequences Generated by Ant Colony Optimisation
Published 2013“…In the authors’ previous research, an ant colony system (ACS) was proposed to solve the DNA sequence design problem based on nearest neighbour. The Watson-Crick base pair ∆Go37 was used as the distance between nodes for the thermodynamic parameters in the problem models for the heuristic approach in the ACS algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
7
Topic identification method for textual document
Published 2017“…This paper proposes a topic identification method that filters the important terms from the preprocessed text and applied term weighting scheme to solve synonym problem.A rule generation algorithm is used to determine the appropriate topics based on the weighted terms.The text document used in the experiment is the English translated Quran.The topics identified from the proposed method were compared with topics identified using Rough Set and domain experts. …”
Get full text
Get full text
Get full text
Article -
8
Control of grain drying process using self-tuning quantitative feedback theory
Published 2011“…System identification technique which utilised experimental input/output data was used to model the grain dryer plant. …”
Get full text
Get full text
Thesis -
9
Hybrid intelligent methods for parameter identification and load frequency control in power system
Published 2014“…The Thesis is divided into two parts in accordance to the topic. Where, in the first part, the coherent identification algorithm for single and multi-area power systems with disturbances is proposed. …”
Get full text
Get full text
Thesis -
10
-
11
-
12
Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions
Published 2018“…The BOGS-BAT algorithm is based on three techniques. The first technique is to move or switch solution from single function to functions that contain more than one objective functions. …”
Get full text
Get full text
Thesis -
13
A block cipher based on genetic algorithm
Published 2016“…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
Get full text
Get full text
Get full text
Thesis -
14
FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources
Published 2026“…To initialise function placement, Fitness-Based Swap (FBSW) algorithm is proposed which places functions based on pre-defined information such as function size, function maximum execution time, and storage cost. …”
Get full text
Get full text
Get full text
Article -
15
A hybrid of fuzzy c-means clustering and Latent Dirichlet Allocation for analysing philanthropic corporate social responsibility activities / Nik Siti Madihah Nik Mangsor
Published 2023“…Then, text pre-processing for data cleaning was performed followed by identification of the best Latent Dirichlet Allocation (LDA) topic modelling technique that was used to integrate document clustering.…”
Get full text
Get full text
Thesis -
16
Computation of cryptosystem based on Lucas functions using addition chain
Published 2010“…Cryptosystem based on Lucas Functions is known as LUC Cryptosystem. …”
Get full text
Get full text
Conference or Workshop Item -
17
An improved fast scanning algorithm based on distance measure and threshold function in region image segmentation
Published 2016“…Hence, this study proposes an Improved Fast Scanning algorithm that is based on Sorensen distance measure and adaptive threshold function. …”
Get full text
Get full text
Get full text
Thesis -
18
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
Published 2003“…Utilizing the properties of Lucas functions introduced a public key system based on Lucas functions instead of exponentiation, which offer a good alternative to the most publicly used exponential public key system RSA. …”
Get full text
Get full text
Thesis -
19
Image encryption algorithm based on chaotic mapping
Published 2003“…HVT function is based on a two-dimensional chaotic map that utilized Baker’s map algorithm. …”
Get full text
Get full text
Get full text
Article -
20
An efficient computation technique for cryptosystems based on Lucas functions
Published 2008Get full text
Get full text
Conference or Workshop Item
