Search Results - (( using extraction method algorithm ) OR ( data virtualization based algorithm ))
Search alternatives:
- virtualization based »
- data virtualization »
- extraction method »
- using extraction »
- method algorithm »
-
1
A novel discrete wavelet transform-based graphical language classifier for identification of high-impedance fault in distribution power system
Published 2020“…Furthermore, the proposed algorithm with LabVIEW facility is more flexible and can be implemented in real time using data acquisition unit for obtaining fault current signal from power system.…”
Get full text
Get full text
Get full text
Article -
2
KDA: An unsupervised approach for analyzing keyphrases distance from news articles as a feature of keyphrase extraction
Published 2022“…Various activities involving natural language processing and information retrieval systems greatly benefit from the use of keyphrases. To extract the best keyphrases and summarize the documents to the highest standard, feature extractions for those keyphrases are crucial. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Urban vegetation mapping through pixel-based image analysis of high-resolution satellite imagery / Haslina Hashim ... [et al.]
Published 2021“…This paper describes the use of high-resolution Pleiades imageries to extract and classify vegetation in an urban area with the use of pixel-based image analysis. …”
Get full text
Get full text
Conference or Workshop Item -
4
Application of clustering in managing unstructured textual data in relational database / Wael Mohamed Shaher Yafooz
Published 2014“…Attempts have been made to resolve all of these issues by using several methods such as: full text searching, text indexing, a database schema management, database data model, and query-based techniques. …”
Get full text
Get full text
Thesis -
5
VGG16-based deep learning architectures for classification of lung sounds into normal, crackles, and wheezes using Gammatonegrams
Published 2023“…In addition, we performed data augmentation in our experiments using audio cycles from the ICBHI database to evaluate the performance of the proposed method. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
The Classification of Wink-Based EEG Signals: The identification on efficiency of transfer learning models by means of kNN classifier
Published 2021“…The time-frequency scalogram conversion of the Right Wink, Left Wink, and No Wink based on EEG signals was carried out through Continuous Wavelet Transform (CWT) algorithm. The features that were extracted through Transfer Learning (TL) models were fed into a number of k-Nearest Neighbors (kNN) classifier models to determine the performance of various feature extraction methods to classify the winking signals. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
-
8
-
9
Energy-efficient algorithms for dynamic virtual machine consolidation in cloud data centers
Published 2017“…Based on the proposed algorithms, energy consumption can be reduced…”
Get full text
Get full text
Get full text
Article -
10
An improved dynamic load balancing for virtualmachines in cloud computing using hybrid bat and bee colony algorithms
Published 2021“…The proposed HBAC algorithm was tested and compared with other stateof-the-art algorithms on 200 to 2000 even tasks by using CloudSim on standard workload format (SWF) data sets file size (200kb and 400kb). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
-
12
-
13
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…Based on this designed text algorithm, a prototype in Visual Basic is developed. …”
Get full text
Get full text
Research Reports -
14
Enhancing hyperparameters of LSTM network models through genetic algorithm for virtual learning environment prediction
Published 2025“…Genetic algorithms for hyperparameter optimization significantly contributed, with the GA + LSTM + ADAGRAD model achieving 88% and 87% accuracy in the 7th and 9th models for BBB course data. …”
Get full text
Get full text
Get full text
Article -
15
Performance analysis of constrained device virtualization algorithm
Published 2020“…We have adopted this technique in our research to virtualize the entire Internet of Things network so that virtual TCP/IP based protocols can operate on virtual networks for enabling interoperability. …”
Get full text
Get full text
Get full text
Article -
16
Impatient job scheduling under cloud computing
Published 2012“…The limitations of those algorithms were addressed and this leads to the proposition of an algorithm that has the ability to map the impatient jobs to virtual machines near its input, output, application, or forth party. …”
Get full text
Get full text
Thesis -
17
-
18
Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti...
Published 2018“…As for this study, virtual area based is been used which applied to bathymetry data set that has been collected by using R2 Sonic 2020. …”
Get full text
Get full text
Thesis -
19
-
20
Energy efficient virtual machine provisioning in cloud data centers
Published 2014Get full text
Get full text
Conference or Workshop Item
