Search Results - (( using evaluation method algorithm ) OR ( basic selection method algorithm ))
Search alternatives:
- evaluation method »
- using evaluation »
- method algorithm »
- selection method »
- basic selection »
-
1
An ensemble feature selection method to detect web spam
Published 2018“…Web spam is an illegal method to increase mendacious rank of internet pages by deceiving the algorithms of search engines, so it is essential to use an efficient method. …”
Get full text
Get full text
Get full text
Article -
2
Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus
Published 2003“…A systematic method for selecting the ANN's input variables was developed using Matlab Programming language.…”
Get full text
Get full text
Thesis -
3
Flowshop scheduling using artificial bee colony (ABC) algorithm with varying onlooker bees approaches
Published 2015“…Artificial Bee Colony (ABC) algorithm is one of the methods used to solve the flowshop scheduling problem but only a few researches have been found using this method in this area. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
A phonetically rich and balanced lexical corpus using zipfian distribution for an under resourced language / Aminath Farshana
Published 2018“…The performance of the proposed method was also evaluated by comparing the results with an existing benchmark method (greedy algorithm). …”
Get full text
Get full text
Get full text
Thesis -
5
FPGA implementation of the complex division in digital predistortion linearizer
Published 2010“…A few suitable algorithms should be selected and implemented in VHDL for evaluation. …”
Get full text
Get full text
Get full text
Article -
6
Nomadic people optimizer (NPO) for large-scale optimization problems
Published 2019“…The basic component of the algorithm consists of several clans and each clan searches for the best place (or best solution) based on the position of their leader. …”
Get full text
Get full text
Thesis -
7
Comparative study of 3D reconstruction methods from 2D sequential images in sports
Published 2020“…These researches have been developed the algorithm that be able to solve illposed problem. Evaluation of the methods was divided in two sections. …”
Get full text
Get full text
Get full text
Article -
8
Hybrid-discrete multi-objective particle swarm optimization for multi-objective job-shop scheduling
Published 2022“…This research first proposes an improved continuous MOPSO to address the rapid clustering problem that exists in the basic PSO algorithm using three improvement strategies: re-initialization of particles, systematic switch of best solutions and mutation on global best selection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Improving Attentive Sequence-to-Sequence Generative-Based Chatbot Model Using Deep Neural Network Approach
Published 2022“…The strategies applied showed that the final accuracy obtained through the training after implementing a modification in the algorithm is at 81% accuracy rate compared to the basic model that recorded its final accuracy at 79% accuracy rate. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
An enhance embedding method using edge and textures detection for image steganography
Published 2024“…The least significant bit (LSB) matching method was applied to embed secret information. The effectiveness of this approach was measured through Peak Signal-to-Noise Ratio, Root Mean Square Error, and Structural Similarity Index Measure, with histogram analysis used to evaluate embedding capacity and method effectiveness. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection
Published 2019“…To realize these objectives, the research in this thesis follows three basic stages, succeeded by extensive evaluations.…”
Get full text
Get full text
Thesis -
12
Inversion of 2D and 3D DC resistivity imaging data for high contrast geophysical regions using artificial neural networks / Ahmad Neyamadpour
Published 2010“…These methods are M1 and M2, and they basically differ in the type of input-output data used to train the artificial neural network. …”
Get full text
Get full text
Thesis -
13
Fingerprint Image Compression Using Wavelet Transform
Published 2003“…The objective of this study is to evaluate a variety of wavelet filters using Wavelet toolbox for selecting the best wavelet filters to be used in compress and decompress of selected fingerprint images. …”
Get full text
Get full text
Thesis -
14
Satellite Image Segmentation Using Thresholding Technique
Published 2017“…Among all the segmentation techniques, thresholding segmentation method is the most popular algorithm and is widely used in the image segmentation field. …”
Get full text
Get full text
Get full text
Thesis -
15
Al-Hams and Al-Jahr Sifaat evaluation using classification approach
Published 2021“…Features selection technique was then implemented to reduce the size of the features vector, where later, K-nearest Neighbor (KNN) algorithm was used as the classification technique. …”
Get full text
Get full text
Get full text
Proceeding Paper -
16
Deterministic phase sequence approach for peak to average power ratio reduction in orthogonal frequency division multiplexing systems
Published 2016“…The proposed idea reduces the computational complexity, processing time and the side information matrix content, basically and ensures the results. The first proposed method, called Gray Code-based Phase sequence (GCP) is a new low complexity PAPR reduction scheme based on a Gray code structure and a similarity measurement block; included on two steps: firstly, selecting the phase sequences based on Gray codes and finally, evaluating the similarity between the input and the output of the Power Amplifier (PA), among the selected phase sequences in the previous step. …”
Get full text
Get full text
Thesis -
17
Application of clustering in managing unstructured textual data in relational database / Wael Mohamed Shaher Yafooz
Published 2014“…The clustering results have been validated using the F-measure, Entropy and Purity methods of measurement and compared with two common methods, which are information extraction and textual document clustering, for example, K-means, Frequent Item-Set, Hierarchical Clustering Algorithms and Oracle Text. …”
Get full text
Get full text
Thesis -
18
-
19
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…It should be analyzed by using a more reliable method such as a malware analyzer. …”
Get full text
Get full text
Thesis -
20
