Search Results - (( using function based algorithm ) OR ( based identification task algorithm ))

Refine Results
  1. 1

    Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani by Seyed Asadollah, Abdiesfandani

    Published 2016
    “…The algorithm simulates two important tasks that are frequently used by the human experts to identify summarizing strategies used to produce the summary sentences: 1) sentences relevance identification; and 2) summarizing strategies identification. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    A comparative study of vibrational response based impact force localization and quantification using radial basis function network and multilayer perceptron by Hossain, M.S., Ong, Z.C., Ismail, Z., Khoo, S.Y.

    Published 2017
    “…Thus, there is a room for improvement to find an alternate algorithm that has great advantage over MLP. For this reason, this study proposes Radial Basis Function Network (RBFN) for possible further improvement in impact identification task. …”
    Get full text
    Get full text
    Article
  4. 4

    An Intelligent System Approach to the Dynamic Hybrid Robot Control by Md. Yeasin, Md. Mahmud Hasan

    Published 1996
    “…Secondly, for the intelligent trajectory generation approach, the segmented tree neural networks for each link (inverse kinematics solution) and the randomness with fuzziness (coping the unstructured environment from the cost function) were used. A one-pass smoothing algorithm was used to generate a practical smooth trajectory path in near real time. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Electromygraphy (EMG) signal based hand gesture recognition using Artificial Neural Network (ANN) by Ahsan, Md. Rezwanul, Ibrahimy, Muhammad Ibn, Khalifa, Othman Omran

    Published 2011
    “…The EMG pattern signatures are extracted from the signals for each movement and then ANN utilized to classify the EMG signals based on features. A back-propagation (BP) network with Levenberg-Marquardt training algorithm has been used for the detection of gesture. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    Human odour detection approach using machine learning by Ahmed Qusay Sabri

    Published 2019
    “…The unsurpassed framework for learning algorithm to be used for human identification is Levenberg-Marquardt backpropagation learning algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Automatic identification of epileptic seizures from EEG signals using sparse representation-based classification by Sobhan Sheykhivand, Tohid Yousefi Rezaii, Zohreh Mousavi, Azra Delpak, Ali Farzamnia

    Published 2020
    “…In this research, a fully automated system is presented to automatically detect the various states of the epileptic seizure. This study is based on sparse representation-based classification (SRC) theory and the proposed dictionary learning using electroencephalogram (EEG) signals. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Data Classification and Its Application in Credit Card Approval by Thai , VinhTuan

    Published 2004
    “…This project is involved with identification of the available algorithms used in data classification and the implementation of C4.5 decision tree induction algorithm in solving the data classifying task. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Named entity recognition using a new fuzzy support vector machine. by Mansouri, Alireza, Affendy, Lilly Suriani, Mamat, Ali

    Published 2008
    “…Nowadays more researchers use three type of approaches namely, Rule-base NER, Machine Learning-base NER and Hybrid NER to identify names. …”
    Get full text
    Get full text
    Article
  11. 11

    Identifying the mechanism to forecast the progression of Alzheimer’s disease from mild cognitive impairment using deep learning by Hiu, Theresa Wei Xin

    Published 2022
    “…This study also implemented a CNN algorithm based on 3D ResNet-18 model using weights from ImageNet for the classification task of CN vs AD and sMCI vs pMCI. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Fault Detection Relevant Modeling of an Industrial Gas Turbine based on Neuro-Fuzzy Approach by Alemu Lemma, Tamiru, Mohd Hashim, Fakhruldin, Rangkuti, Chalillullah

    Published 2010
    “…Structure and network weights for the NF model are determined by a synergetic approach – Data clustering and Gradient Descent algorithm. Operation data collected in 10 seconds interval and for one day is used for model training and validation. …”
    Get full text
    Conference or Workshop Item
  13. 13

    Hybrid fault detection using kalman filter and neural network for quadrotor micro aerial vehicle by Chan, Shi Jing

    Published 2018
    “…Two classes of approaches are analysed: the fault system identification approach ANN and the observer-based approach using the extended kalman filter. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Zero distortion-based steganography for handwritten signature by Iranmanesh, Vahab

    Published 2018
    “…Thus, developing a steganographic algorithm to use cover media (c) without raising attention is the most challenging task in data hiding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Integrated framework with association analysis for gene selection in microarray data classification by Ong, Huey Fang

    Published 2011
    “…However, most of the existing gene selection methods are statistical analyses and purely based on gene expression values in the identification of differentially expressed genes. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Identification of power poles based on satellite stereo images using graph-cut algorithm by Qayyum, Abdul, Malik, Aamir Saeed, Mohamad Saad, Mohamad Naufal, Ahmad, Rana Fayyaz, Taun Abdullah, Taun Ab Rashid

    Published 2015
    “…We incorporated the ordering constrain with Graph-Cut on stereo images to detect occlusion on stereo matching algorithm. This will increase the accuracy of the disparity map which is required task for identification of power poles near vegetation based on satellite stereo images. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Effective keyword query structuring using NER for XML retrieval by Roko, Abubakar, Doraisamy, Shyamala, Jantan, Azrul Hazri, Azman, Azreen

    Published 2015
    “…It also include a ranking function computes a score for each generated query by using both semantic information and data statistic as opposed to data statistic only approach used by the existing approaches.…”
    Get full text
    Get full text
    Article
  20. 20

    A Comparative of Two-Dimensional Statistical Moment Invariants Features in Formulating an Automated Probabilistic Machine Learning Identification Algorithm for Forensic Application by Zun Liang, Chuan, David, Chong Teak Wei, Connie, Lee Wai Yan, Muhammad Fuad Ahmad, Nasser, Nor Azura Md, Ghani, Abdul Aziz, Jemain, Choong-Yeun, Liong

    Published 2023
    “…Theseempiricalresults also conveyed that the superior proposed identification algorithm in this research could be developed as a mobile application for ballistics identification that can significantly reduce the time taken and conveniently perform the ballistics identification tasks.…”
    Get full text
    Get full text
    Get full text
    Article