Search Results - (( using function method algorithm ) OR ( _ identification task algorithm ))

Refine Results
  1. 1

    Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani by Seyed Asadollah, Abdiesfandani

    Published 2016
    “…The algorithm simulates two important tasks that are frequently used by the human experts to identify summarizing strategies used to produce the summary sentences: 1) sentences relevance identification; and 2) summarizing strategies identification. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Continuous-time Hammerstein model identification utilizing hybridization of augmented sine cosine algorithm and game-theoretic approach by Mohd Helmi, Suid, Mohd Ashraf, Ahmad, Ahmad Nor Kasruddin, Nasir, Mohd Riduwan, Ghazali, Jui, Julakha Jahan

    Published 2024
    “…The performance of ASCA-GT was evaluated using 13 benchmark functions and mathematical scenarios, as well as the Twin-Rotor System (TRS) and Electro-Mechanical Positioning System (EMPS). …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    An Intelligent System Approach to the Dynamic Hybrid Robot Control by Md. Yeasin, Md. Mahmud Hasan

    Published 1996
    “…Secondly, for the intelligent trajectory generation approach, the segmented tree neural networks for each link (inverse kinematics solution) and the randomness with fuzziness (coping the unstructured environment from the cost function) were used. A one-pass smoothing algorithm was used to generate a practical smooth trajectory path in near real time. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    A comparative study of vibrational response based impact force localization and quantification using radial basis function network and multilayer perceptron by Hossain, M.S., Ong, Z.C., Ismail, Z., Khoo, S.Y.

    Published 2017
    “…Thus, there is a room for improvement to find an alternate algorithm that has great advantage over MLP. For this reason, this study proposes Radial Basis Function Network (RBFN) for possible further improvement in impact identification task. …”
    Get full text
    Get full text
    Article
  7. 7

    Human odour detection approach using machine learning by Ahmed Qusay Sabri

    Published 2019
    “…The unsurpassed framework for learning algorithm to be used for human identification is Levenberg-Marquardt backpropagation learning algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Named entity recognition using a new fuzzy support vector machine. by Mansouri, Alireza, Affendy, Lilly Suriani, Mamat, Ali

    Published 2008
    “…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
    Get full text
    Get full text
    Article
  9. 9

    Automatic identification of epileptic seizures from EEG signals using sparse representation-based classification by Sobhan Sheykhivand, Tohid Yousefi Rezaii, Zohreh Mousavi, Azra Delpak, Ali Farzamnia

    Published 2020
    “…Compared to state-of-the-art algorithms and other common methods, our method outperformed them in terms of sensitivity, specificity, and accuracy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Identifying the mechanism to forecast the progression of Alzheimer’s disease from mild cognitive impairment using deep learning by Hiu, Theresa Wei Xin

    Published 2022
    “…This study also implemented a CNN algorithm based on 3D ResNet-18 model using weights from ImageNet for the classification task of CN vs AD and sMCI vs pMCI. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    New techniques incorporating computational intelligence based for voltage stability evaluation and improvement in power system / Nur Fadilah Ab. Aziz by Ab. Aziz, Nur Fadilah

    Published 2014
    “…The competency of VSCI was corroborated in three tasks; weak bus identification, automatic line outage contingency ranking and weak area identification. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Modelling and angle control of fiber braided bending actuator for finger rehabilitation by Muhammad Nasir Annadurai, Mohd Nizar

    Published 2023
    “…In this study, one approach to implementing closed-loop control is through system identification (SI), using a transfer function that simulates the actual actuator. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Hybrid fault detection using kalman filter and neural network for quadrotor micro aerial vehicle by Chan, Shi Jing

    Published 2018
    “…Two classes of approaches are analysed: the fault system identification approach ANN and the observer-based approach using the extended kalman filter. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A Comparative of Two-Dimensional Statistical Moment Invariants Features in Formulating an Automated Probabilistic Machine Learning Identification Algorithm for Forensic Application by Zun Liang, Chuan, David, Chong Teak Wei, Connie, Lee Wai Yan, Muhammad Fuad Ahmad, Nasser, Nor Azura Md, Ghani, Abdul Aziz, Jemain, Choong-Yeun, Liong

    Published 2023
    “…Theseempiricalresults also conveyed that the superior proposed identification algorithm in this research could be developed as a mobile application for ballistics identification that can significantly reduce the time taken and conveniently perform the ballistics identification tasks.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Effective keyword query structuring using NER for XML retrieval by Roko, Abubakar, Doraisamy, Shyamala, Jantan, Azrul Hazri, Azman, Azreen

    Published 2015
    “…It also include a ranking function computes a score for each generated query by using both semantic information and data statistic as opposed to data statistic only approach used by the existing approaches.…”
    Get full text
    Get full text
    Article
  16. 16

    Integrated framework with association analysis for gene selection in microarray data classification by Ong, Huey Fang

    Published 2011
    “…However, most of the existing gene selection methods are statistical analyses and purely based on gene expression values in the identification of differentially expressed genes. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A Robust Firearm Identification Algorithm of Forensic Ballistics Specimens by Z. L., Chuan, A. A., Jemain, C-Y, Liong, N. A. M., Ghani, L. K., Tan

    Published 2017
    “…There are several inherent difficulties in the existing firearm identification algorithms, include requiring the physical interpretation and time consuming. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Author Identification : Performance Comparison using English and Under-Resourced Languages by Nursyahirah, Tarmizi, Suhaila, Saee, Dayang Hanani, Abang Ibrahim

    Published 2020
    “…This paper presents Author Identification (AI) task using different language which are English and Under-Resourced Languages (U-RL) (i.e. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20