Search Results - (( using function methods algorithm ) OR ( automatic identification using algorithm ))
Search alternatives:
- identification using »
- methods algorithm »
- function methods »
- using algorithm »
- using function »
-
1
-
2
-
3
Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique
Published 2018“…In this research, it is to apply the Hilbert-Huang transform (HHT) as a method to analyse the pressure transient signal. The HHT is a way to decompose a signal into intrinsic mode functions (IMF). …”
Get full text
Get full text
Thesis -
4
Fault identification in pipeline system using normalized hilbert huang transform and automatic selection of intrinsic mode function
Published 2018“…This paper proposed to apply Integrated Kurtosis-based Algorithm for z-filter Technique (Ikaz) for that allows automatic selection of intrinsic mode function (IMF) that’s should be used. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. …”
Get full text
Get full text
Thesis -
6
Identification of Corn Leaf Diseases Comprising of Blight, Grey Spot and Rust Using DenseNet-201
Published 2022“…The training and validation analysis of distinctive epoch values of DenseNet-201 were also used to validate the proposed method, which resulted in significantly higher identification accuracy. …”
Get full text
Get full text
Get full text
Article -
7
Automatic identification of epileptic seizures from EEG signals using sparse representation-based classification
Published 2020“…Compared to state-of-the-art algorithms and other common methods, our method outperformed them in terms of sensitivity, specificity, and accuracy. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
8
Real-time identification of an unmanned quadcopter flight dynamics using fully tuned radial basis function network
Published 2018“…Recursive system identification based on neural network (NN) offers an alternative method for quadcopter dynamics modelling. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Pipeline condition assessment by instantaneous frequency response over hydroinformatics based technique—An experimental and field analysis
Published 2021“…The results showed that, although with a low ratio of signal-to-noise, the proposed method could be used as an automatic selector for Intrinsic Mode Function (IMF). …”
Get full text
Get full text
Get full text
Article -
10
Optimization of RFID network planning for monitoring railway mechanical defects based on gradient-based Cuckoo search algorithm
Published 2020“…The Gradient-Based Cuckoo Search (GBCS) algorithm was used to achieve the final objective. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
-
12
A preliminary study on automated freshwater algae recognition and classification system / Hayat Mansoor Abdullah
Published 2012“…Then, Image segmentation applied by using canny edge detection algorithm with specific morphological operation to isolate the image objects components. …”
Get full text
Get full text
Thesis -
13
Projecting named entity tags from a resource rich language to a resource poor language
Published 2012“…Named Entity Recognition (NER) is the identification of words in text that correspond to a pre-defined taxonomy such as person, organization, location, date, time, etc.This article focuses on the person (PER), organization (ORG) and location (LOC) entities for a Malay journalistic corpus of terrorism.A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism.The English corpus is the translated version of the Malay corpus.Hence, these two corpora are treated as parallel corpora. …”
Get full text
Get full text
Get full text
Article -
14
Projecting named entity tags from a resource rich language to a resource poor language
Published 2013“…This article focuses on the person (PER), organization (ORG) and location (LOC) entities for a Malay journalistic corpus of terrorism. A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism. …”
Get full text
Get full text
Article -
15
Projecting named entity tags from a resource rich language to a resource poor language
Published 2013“…This article focuses on the person (PER), organization (ORG) and location (LOC) entities for a Malay journalistic corpus of terrorism. A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism. …”
Get full text
Get full text
Article -
16
Projecting named entity tags from a resource rich language to a resource poor language
Published 2013“…This article focuses on the person (PER), organization (ORG) and location (LOC) entities for a Malay journalistic corpus of terrorism. A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism. …”
Get full text
Get full text
Article -
17
Tumor Extraction for Brain Magnetic Resonance Imaging Using Modified Gaussian Distribution
Published 2006“…A gain-based correction method; probability density function model are used to cluster white and gray matters, cerebrospinal fluid, and meninges. …”
Get full text
Get full text
Thesis -
18
Improved genetic algorithm for direct current motor high speed controller implemented on field programmable gate array
Published 2019“…The third methodology is to integrate the proposed controller on FPGA, using a new method to run the design based simulink model. …”
Get full text
Get full text
Thesis -
19
Leak localization using empirical mode decomposition and teager-kaiser energy operator analysis based on pressure transient signal: experimental study
Published 2019“…This paper focused on leak identification and localization using Teiger-Kaiser Energy Operator (TKEO) as instantaneous frequency analysis (IFA) while Empirical Mode Decomposition (EMD) as decomposition method with implementation of Integrated Kurtosis Algorithm for Z-Filter (Ikaz) to Kurtosis ratio as the automatic selection criterion for intrinsic mode function (IMF). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
IRFOC induction motor with rotor time constant estimation modelling and simulation
Published 2005“…Purpose– To provide a new and simple inverse rotor time constant identification method which can be used to update an indirect rotor field oriented controlled (IRFOC) induction motor algorithm.Design/methodology/approach– Two different equations are used to estimate the rotor flux in the stator reference frame. …”
Get full text
Get full text
Get full text
Article
