Search Results - (( using function _ algorithm ) OR ( automatic identification using algorithm ))
Search alternatives:
- identification using »
- using algorithm »
- using function »
-
1
-
2
-
3
Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique
Published 2018“…The current research presents the implementation of an integrated kurtosisbased algorithm for a z-filter technique (Ikaz) to kurtosis ratio (Ikaz-kurtosis), for this allows automatic selection of the IMF that should be used. …”
Get full text
Get full text
Thesis -
4
Fault identification in pipeline system using normalized hilbert huang transform and automatic selection of intrinsic mode function
Published 2018“…This paper proposed to apply Integrated Kurtosis-based Algorithm for z-filter Technique (Ikaz) for that allows automatic selection of intrinsic mode function (IMF) that’s should be used. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. …”
Get full text
Get full text
Thesis -
6
Real-time identification of an unmanned quadcopter flight dynamics using fully tuned radial basis function network
Published 2018“…The results also showed that the proposed extended minimal resource allocating networks (EMRAN) algorithm is capable to adapt with dynamics changes and infer quadcopter model with an even shorter training time (4.16ms) than MRAN and suitable for real-time system identification.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Identification of Corn Leaf Diseases Comprising of Blight, Grey Spot and Rust Using DenseNet-201
Published 2022“…The DenseNet-201 also has been validated to function as anticipated in identifying corn leaf diseases based on the algorithm validation assessment.…”
Get full text
Get full text
Get full text
Article -
8
Automatic identification of epileptic seizures from EEG signals using sparse representation-based classification
Published 2020“…Compared to state-of-the-art algorithms and other common methods, our method outperformed them in terms of sensitivity, specificity, and accuracy. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
9
Pipeline condition assessment by instantaneous frequency response over hydroinformatics based technique—An experimental and field analysis
Published 2021“…The results showed that, although with a low ratio of signal-to-noise, the proposed method could be used as an automatic selector for Intrinsic Mode Function (IMF). …”
Get full text
Get full text
Get full text
Article -
10
Optimization of RFID network planning for monitoring railway mechanical defects based on gradient-based Cuckoo search algorithm
Published 2020“…The Gradient-Based Cuckoo Search (GBCS) algorithm was used to achieve the final objective. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
-
12
-
13
Mel Frequency Cepstral Coefficient (MFCC) extraction for speaker identification on FPGA
Published 2009Get full text
Working Paper -
14
Automatic detection and indication of pallet-level tagging from rfid readings using machine learning algorithms
Published 2020“…The ensemble learning technique, changes of activation function in Neural Network as well as the unsupervised learning (k-means clustering algorithm and Friis Transmission Equation) was also applied to classify the multiclass classification in pallet-level. …”
Get full text
Get full text
Thesis -
15
A preliminary study on automated freshwater algae recognition and classification system / Hayat Mansoor Abdullah
Published 2012“…Then, Image segmentation applied by using canny edge detection algorithm with specific morphological operation to isolate the image objects components. …”
Get full text
Get full text
Thesis -
16
Projecting named entity tags from a resource rich language to a resource poor language
Published 2012“…Named Entity Recognition (NER) is the identification of words in text that correspond to a pre-defined taxonomy such as person, organization, location, date, time, etc.This article focuses on the person (PER), organization (ORG) and location (LOC) entities for a Malay journalistic corpus of terrorism.A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism.The English corpus is the translated version of the Malay corpus.Hence, these two corpora are treated as parallel corpora. …”
Get full text
Get full text
Get full text
Article -
17
Projecting named entity tags from a resource rich language to a resource poor language
Published 2013“…This article focuses on the person (PER), organization (ORG) and location (LOC) entities for a Malay journalistic corpus of terrorism. A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism. …”
Get full text
Get full text
Article -
18
Projecting named entity tags from a resource rich language to a resource poor language
Published 2013“…This article focuses on the person (PER), organization (ORG) and location (LOC) entities for a Malay journalistic corpus of terrorism. A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism. …”
Get full text
Get full text
Article -
19
Projecting named entity tags from a resource rich language to a resource poor language
Published 2013“…This article focuses on the person (PER), organization (ORG) and location (LOC) entities for a Malay journalistic corpus of terrorism. A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism. …”
Get full text
Get full text
Article -
20
Improved genetic algorithm for direct current motor high speed controller implemented on field programmable gate array
Published 2019“…There are many researches have been done to optimize PI controller based evolutionary algorithm, such as Genetic Algorithm (GA). However, it has several drawbacks come from randomly searching constraints that cause lousy optimization. …”
Get full text
Get full text
Thesis
