Search Results - (( using function method algorithm ) OR ( based identification task algorithm ))
Search alternatives:
- based identification »
- identification task »
- method algorithm »
- function method »
- using function »
- task algorithm »
-
1
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…The algorithm simulates two important tasks that are frequently used by the human experts to identify summarizing strategies used to produce the summary sentences: 1) sentences relevance identification; and 2) summarizing strategies identification. …”
Get full text
Get full text
Thesis -
2
Optimization of RFID network planning for monitoring railway mechanical defects based on gradient-based Cuckoo search algorithm
Published 2020“…The Gradient-Based Cuckoo Search (GBCS) algorithm was used to achieve the final objective. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
A comparative study of vibrational response based impact force localization and quantification using radial basis function network and multilayer perceptron
Published 2017“…Thus, there is a room for improvement to find an alternate algorithm that has great advantage over MLP. For this reason, this study proposes Radial Basis Function Network (RBFN) for possible further improvement in impact identification task. …”
Get full text
Get full text
Article -
4
An Intelligent System Approach to the Dynamic Hybrid Robot Control
Published 1996“…Secondly, for the intelligent trajectory generation approach, the segmented tree neural networks for each link (inverse kinematics solution) and the randomness with fuzziness (coping the unstructured environment from the cost function) were used. A one-pass smoothing algorithm was used to generate a practical smooth trajectory path in near real time. …”
Get full text
Get full text
Thesis -
5
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
Get full text
Get full text
Get full text
Thesis -
6
Human odour detection approach using machine learning
Published 2019“…The unsurpassed framework for learning algorithm to be used for human identification is Levenberg-Marquardt backpropagation learning algorithm. …”
Get full text
Get full text
Get full text
Thesis -
7
Automatic identification of epileptic seizures from EEG signals using sparse representation-based classification
Published 2020“…Compared to state-of-the-art algorithms and other common methods, our method outperformed them in terms of sensitivity, specificity, and accuracy. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
8
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
Get full text
Get full text
Article -
9
Identifying the mechanism to forecast the progression of Alzheimer’s disease from mild cognitive impairment using deep learning
Published 2022“…This study also implemented a CNN algorithm based on 3D ResNet-18 model using weights from ImageNet for the classification task of CN vs AD and sMCI vs pMCI. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
New techniques incorporating computational intelligence based for voltage stability evaluation and improvement in power system / Nur Fadilah Ab. Aziz
Published 2014“…Another new hybrid algorithm that used Evolutionary Programming (EP) termed as Evolutionary Support Vector Machine (ESVM) was also developed for comparative study. …”
Get full text
Get full text
Thesis -
11
Hybrid fault detection using kalman filter and neural network for quadrotor micro aerial vehicle
Published 2018“…Two classes of approaches are analysed: the fault system identification approach ANN and the observer-based approach using the extended kalman filter. …”
Get full text
Get full text
Thesis -
12
Integrated framework with association analysis for gene selection in microarray data classification
Published 2011“…However, most of the existing gene selection methods are statistical analyses and purely based on gene expression values in the identification of differentially expressed genes. …”
Get full text
Get full text
Thesis -
13
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
Get full text
Get full text
Thesis -
14
Effective keyword query structuring using NER for XML retrieval
Published 2015“…It also include a ranking function computes a score for each generated query by using both semantic information and data statistic as opposed to data statistic only approach used by the existing approaches.…”
Get full text
Get full text
Article -
15
Identification of power poles based on satellite stereo images using graph-cut algorithm
Published 2015“…We incorporated the ordering constrain with Graph-Cut on stereo images to detect occlusion on stereo matching algorithm. This will increase the accuracy of the disparity map which is required task for identification of power poles near vegetation based on satellite stereo images. …”
Get full text
Get full text
Conference or Workshop Item -
16
A Comparative of Two-Dimensional Statistical Moment Invariants Features in Formulating an Automated Probabilistic Machine Learning Identification Algorithm for Forensic Application
Published 2023“…Theseempiricalresults also conveyed that the superior proposed identification algorithm in this research could be developed as a mobile application for ballistics identification that can significantly reduce the time taken and conveniently perform the ballistics identification tasks.…”
Get full text
Get full text
Get full text
Article -
17
Author Identification : Performance Comparison using English and Under-Resourced Languages
Published 2020“…The approach used in AI task is based on supervised machine learning. Cross-validation is used to evaluate the performance of AI task. …”
Get full text
Get full text
Get full text
Article -
18
A Robust Firearm Identification Algorithm of Forensic Ballistics Specimens
Published 2017“…Therefore, the aim of this study is to propose a robust algorithm for a firearm identification based on extracting a set of informative features from the segmented region of interest (ROI) using the simulated noisy center-firing pin impression images. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm
Published 2020“…Recently, several studies showed that the brain electrical activity or electroencephalogram (EEG) signals provide unique features that can be considered as user identification techniques. But, it is a challenging task where there are three important things must be addressed carefully in any EEG-based person identification. …”
Get full text
Get full text
Thesis -
20
Complex word identification model for lexical simplification in the Malay language for non-native speakers
Published 2023“…Lexical Simplification (LS), a method in TS, is the task of converting words into simpler words. Past studies have shown weaknesses in the LS first task, called Complex Word Identification (CWI), where simple and complex words have been misidentified in previous CWI model. …”
Get full text
Get full text
Get full text
Thesis
