Search Results - (( using function method algorithm ) OR ( _ identification task algorithm ))
Search alternatives:
- identification task »
- method algorithm »
- _ identification »
- function method »
- using function »
- task algorithm »
-
1
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…The algorithm simulates two important tasks that are frequently used by the human experts to identify summarizing strategies used to produce the summary sentences: 1) sentences relevance identification; and 2) summarizing strategies identification. …”
Get full text
Get full text
Thesis -
2
Continuous-time Hammerstein model identification utilizing hybridization of augmented sine cosine algorithm and game-theoretic approach
Published 2024“…The performance of ASCA-GT was evaluated using 13 benchmark functions and mathematical scenarios, as well as the Twin-Rotor System (TRS) and Electro-Mechanical Positioning System (EMPS). …”
Get full text
Get full text
Get full text
Article -
3
An Intelligent System Approach to the Dynamic Hybrid Robot Control
Published 1996“…Secondly, for the intelligent trajectory generation approach, the segmented tree neural networks for each link (inverse kinematics solution) and the randomness with fuzziness (coping the unstructured environment from the cost function) were used. A one-pass smoothing algorithm was used to generate a practical smooth trajectory path in near real time. …”
Get full text
Get full text
Thesis -
4
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
Get full text
Get full text
Get full text
Thesis -
5
Optimization of RFID network planning for monitoring railway mechanical defects based on gradient-based Cuckoo search algorithm
Published 2020“…The Gradient-Based Cuckoo Search (GBCS) algorithm was used to achieve the final objective. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
A comparative study of vibrational response based impact force localization and quantification using radial basis function network and multilayer perceptron
Published 2017“…Thus, there is a room for improvement to find an alternate algorithm that has great advantage over MLP. For this reason, this study proposes Radial Basis Function Network (RBFN) for possible further improvement in impact identification task. …”
Get full text
Get full text
Article -
7
Human odour detection approach using machine learning
Published 2019“…The unsurpassed framework for learning algorithm to be used for human identification is Levenberg-Marquardt backpropagation learning algorithm. …”
Get full text
Get full text
Get full text
Thesis -
8
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
Get full text
Get full text
Article -
9
Automatic identification of epileptic seizures from EEG signals using sparse representation-based classification
Published 2020“…Compared to state-of-the-art algorithms and other common methods, our method outperformed them in terms of sensitivity, specificity, and accuracy. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
10
Identifying the mechanism to forecast the progression of Alzheimer’s disease from mild cognitive impairment using deep learning
Published 2022“…This study also implemented a CNN algorithm based on 3D ResNet-18 model using weights from ImageNet for the classification task of CN vs AD and sMCI vs pMCI. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
New techniques incorporating computational intelligence based for voltage stability evaluation and improvement in power system / Nur Fadilah Ab. Aziz
Published 2014“…The competency of VSCI was corroborated in three tasks; weak bus identification, automatic line outage contingency ranking and weak area identification. …”
Get full text
Get full text
Thesis -
12
Modelling and angle control of fiber braided bending actuator for finger rehabilitation
Published 2023“…In this study, one approach to implementing closed-loop control is through system identification (SI), using a transfer function that simulates the actual actuator. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Hybrid fault detection using kalman filter and neural network for quadrotor micro aerial vehicle
Published 2018“…Two classes of approaches are analysed: the fault system identification approach ANN and the observer-based approach using the extended kalman filter. …”
Get full text
Get full text
Thesis -
14
A Comparative of Two-Dimensional Statistical Moment Invariants Features in Formulating an Automated Probabilistic Machine Learning Identification Algorithm for Forensic Application
Published 2023“…Theseempiricalresults also conveyed that the superior proposed identification algorithm in this research could be developed as a mobile application for ballistics identification that can significantly reduce the time taken and conveniently perform the ballistics identification tasks.…”
Get full text
Get full text
Get full text
Article -
15
Effective keyword query structuring using NER for XML retrieval
Published 2015“…It also include a ranking function computes a score for each generated query by using both semantic information and data statistic as opposed to data statistic only approach used by the existing approaches.…”
Get full text
Get full text
Article -
16
Integrated framework with association analysis for gene selection in microarray data classification
Published 2011“…However, most of the existing gene selection methods are statistical analyses and purely based on gene expression values in the identification of differentially expressed genes. …”
Get full text
Get full text
Thesis -
17
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
Get full text
Get full text
Thesis -
18
A Robust Firearm Identification Algorithm of Forensic Ballistics Specimens
Published 2017“…There are several inherent difficulties in the existing firearm identification algorithms, include requiring the physical interpretation and time consuming. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Author Identification : Performance Comparison using English and Under-Resourced Languages
Published 2020“…This paper presents Author Identification (AI) task using different language which are English and Under-Resourced Languages (U-RL) (i.e. …”
Get full text
Get full text
Get full text
Article -
20
