Search Results - (( using computational method algorithm ) OR ( using action method algorithm ))
Search alternatives:
- computational method »
- method algorithm »
- action method »
- using action »
-
1
An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization
Published 2019“…The threshold adaptation was achieved by using the mean value, the standard deviation, and the L1-norm instead of the comparison of user summaries evaluation method to obtain a fully automatic video summarisation algorithm, and by eliminating the conditions in selecting the final key frames to reduce the complexity of the algorithm. …”
Get full text
Get full text
Article -
2
A Newton Cooperative Genetic Algorithm Method for In Silico Optimization of Metabolic Pathway Production
Published 2015“…The NCGA used Newton method in dealing with the metabolic pathway, and then integrated genetic algorithm and cooperative co-evolutionary algorithm. …”
Get full text
Get full text
Get full text
Article -
3
A new ant based rule extraction algorithm for web classification
Published 2011Get full text
Get full text
Get full text
Get full text
Monograph -
4
Algorithm As A Problem Solving Technique For Teaching And Learning Of The Malay Language
Published 2019“…As a conclusion, the student's reaction as they remain focused throughout the session shows that the use of algorithms and scratch programs is better than conventional methods in teaching the Malay Language…”
Get full text
Get full text
Get full text
Article -
5
Algorithm as a problem solving technique for teaching and learning of the Malay language
Published 2019“…As a conclusion, the student's reaction as they remain focused throughout the session shows that the use of algorithms and scratch programs is better than conventional methods in teaching the Malay Language.…”
Get full text
Get full text
Get full text
Article -
6
Particle swarm optimization with deep learning for human action recognition
Published 2021“…Motion target detection and tracking are among the most important computer vision areas that use advanced image processing techniques. …”
Get full text
Get full text
Article -
7
Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof
Published 2019“…From the reviews, it is evident that autonomous system is set to handle finite number of encountered states using finite sequences of actions. In order to learn the optimized states-action policy the self-learning algorithm is developed using hybrid AI algorithm by combining unsupervised weightless neural network, which employs AUTOWiSARD and reinforcement learning algorithm, which employs Q-learning. …”
Get full text
Get full text
Thesis -
8
Newton competitive genetic algorithm method for optimization the production of biochemical systems
Published 2018“…In this work, the optimization of biochemical systems production is performed by using a hybrid method of Newton competitive genetic algorithm is presented. …”
Get full text
Get full text
Get full text
Article -
9
Revolutionizing video analytics: a review of action recognition using 3D
Published 2024“…As an interdisciplinary field, the 3D video action recognition model interprets human actions in three-dimensional video data using approaches such as pose-based, volumetric, motionbased, and hybrid methods. 3D video action recognition finds application in surveillance, sports analysis, human-computer interaction, healthcare, robotics, and augmented/virtual reality. …”
Get full text
Get full text
Article -
10
Modular motor driver with torque control for gripping mechanism
Published 2023“…Using the same hardware configuration, the different algorithms produced different outcomes on the output of the controller. …”
Conference paper -
11
Adaptive artificial neural network for power system security assessment and control action
Published 2012“…This is particularly important for giving a possible control action to mitigate an insecure situation during disturbance using AANN. …”
Get full text
Get full text
Thesis -
12
Simulation of an adaptive artificial neural network for power system security enhancement including control action
Published 2015“…This paper presents a new method for enhancing power system security, including a remedial action, using an artificial neural network (ANN) technique. …”
Get full text
Get full text
Get full text
Article -
13
First Semester Computer Science Students’ Academic Performances Analysis by Using Data Mining Classification Algorithms
Published 2014“…From the experiment, the models develop using Rule Based and Decision Tree algorithm shows the best result compared to the model develop from the Naïve Bayes algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi
Published 2017“…The more the algorithm use in a project the better performance will be in result.…”
Get full text
Get full text
Thesis -
15
Text steganalysis using evolution algorithm approach
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Computational intelligence in steganalysis environment
Published 2008“…Three (3) major methods have also been identified in the computational intelligence based on these steganalysis domains which are bayesian, neural network, and genetic algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
New Cryptographic Algorithms for Enhancing Security of Voice Data
Published 2010“…Most of the known encryption algorithms are computationally expensive resulting in a significant amount of time added to packet delay. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
E-Hadith DV: Hadith scriptures in Syafie Madhhab retrieval using data visualization / Nor Faezahtul Salme Norhisam
Published 2020“…The results from the previous stage will be used to generate visualizations by using the D3.js library. …”
Get full text
Get full text
Thesis -
19
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…After that, autonomous anomaly detection for streaming data (AADS) is proposed to detect anomalies in any amount of data. The AADS algorithm uses evolving methods which are evolving autonomous data partitioning (eADP) and non-weighted frequency equations. …”
Get full text
Get full text
Thesis -
20
Active force control with iterative learning control algorithm for a vehicle suspension
Published 2013“…ILC algorithm is implemented into AFC-based control scheme to reduce its complexity and hence faster response, by replacing the use of artificial intelligence (Al) method as proposed by previous researcher. …”
Get full text
Get full text
Thesis
