Search Results - (((( pattern matching algorithm ) OR ( e learning algorithm ))) OR ( patterns among algorithm ))
Search alternatives:
- learning algorithm »
- among algorithm »
- e learning »
- matching »
-
1
Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation
Published 2023Subjects: “…Knuth-Morris-Pratt (KMP) pattern matching algorithm…”
Conference paper -
2
Medical Image Analysis Using Deep Learning and Distribution Pattern Matching Algorithm
Published 2023“…Automation; Complex networks; Computational complexity; Deep learning; Image analysis; Medical imaging; Pattern matching; Pixels; Distribution pattern-matching rule; Distribution patterns; Gray wolf-optimized deep convolution network; Gray wolves; Learning patterns; Matching rules; Medical fields; Medical image analysis; Pattern matching algorithms; Pattern-matching; Convolution…”
Article -
3
-
4
Implementing case-based reasoning approach to framework documentation
Published 2023Subjects:Conference paper -
5
Investigation of block matching algorithm for video coding
Published 2013“…The Spatial model exploits the redundancy in a single video frame (I frame) while the temporal model exploits the redundancy among frames (P frame). The temporal model deals with motion estimation (ME) and motion compensation (MC) algorithm with the matching technique called “Block Matching Algorithm” (BMA) to produce the next encoded video frame with motion vector. …”
Get full text
Get full text
Get full text
Thesis -
6
Mobile Malware Classification via System Calls and Permission for GPS Exploitation
Published 2024Article -
7
Improved GART neural network model for pattern classification and rule extraction with application to power systems
Published 2023“…IGART enhances the dynamics of GART in several aspects, which include the use of the Laplacian likelihood function, a new vigilance function, a new match-tracking mechanism, an ordering algorithm for determining the sequence of training data, and a rule extraction capability to elicit if-then rules from the network. …”
Article -
8
Composing multi-relations association rules from crowdsourcing remuneration data
Published 2022“…The data comprise a lot of redundancies, therefore an apriori algorithm is used to normalise it by removing redundancies and then extracting significant patterns. …”
Get full text
Get full text
Get full text
Article -
9
APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN
Published 2011“…For the third contribution, we have applied the Self-Training algorithm which is one of the semi-supervised machines learning technique. …”
Get full text
Get full text
Thesis -
10
Improving named entity recognition accuracy of gene and protein in biomedical text
Published 2011“…In this study, to handle the above issues in recognizing gene and protein names, a statistical similarity measurement as a pattern matching function is proposed. Our approach is based on an assumption that a named entity occurs among a noun group which is extracted using Brill Part of Speech tagger. …”
Get full text
Get full text
Thesis -
11
Classification of students' performance in computer programming course according to learning style
Published 2024Conference Paper -
12
Music Recommender System Using Machine Learning Content-Based Filtering Technique
Published 2022“…These algorithms identify hidden patterns or data groupings without the assistance of a human. …”
Get full text
Get full text
Undergraduates Project Papers -
13
A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat
Published 2021“…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
Get full text
Get full text
Thesis -
14
STATISTICAL FEATURE LEARNING THROUGH ENHANCED DELAUNAY CLUSTERING AND ENSEMBLE CLASSIFIERS FOR SKIN LESION SEGMENTATION AND CLASSIFICATION
Published 2021“…Moreover, skin lesion images are clustered based on fused color, pattern and shape based features. A boost ensemble learning algorithm using Support Vector Machines (SVM) as initial classifiers and Artificial Neural Networks (ANN) as a final classifier is employed to learn the patterns of different skin lesion class features. …”
Get full text
Get full text
Get full text
Article -
15
An efficient fuzzy C-least median clustering algorithm
Published 2021“…The outcomes demonstrate a clear improvement of our algorithm than existing FCM algorithm.…”
Get full text
Get full text
Get full text
Get full text
Article -
16
Identifying Cyberspace Users� Tendency in Blog Writing Using Machine Learning Algorithms
Published 2023“…There is a specific proportion between blog features and bloggersâ�� tendency to social, political, and cultural patterns of different countries and nations that create trends among the bloggers in these countries. …”
Get full text
Get full text
Article -
17
Herb recognition for mobile apps / Jumriyanie Baba
Published 2017“…Two texture features have been experimented that are Local Binary Pattern (LBP) and Histogram of Oriented Gradient (HOG). …”
Get full text
Get full text
Thesis -
18
Performance Analysis Of Different Hash Functions Using Bloom Filter For Network Intrusion Detection Systems In 32-Bit And 64-Bit Computer Operation Mode.
Published 2016“…A Bloom Filter is an array of bits that determine whether a given structure of information belongs to it. A Bloom Filter pattern matching algorithm with fast hashing functions is developed for 32-bit and 64-bit computer system. …”
Get full text
Get full text
Thesis -
19
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…Datasets of well-known SQL injection attack patterns and AI/ML models intended for cybersecurity anomaly detection are among the resources underexplored, these findings show the potential for boosting detection capabilities by deploying ML and AI-based security solutions, with some algorithms scoring up to an 80 percent success rate in identifying SQL injections. …”
Get full text
Get full text
Get full text
Article -
20
COMPUTER AIDED SYSTEM FOR BREAST CANCER DIAGNOSIS USING CURVELET TRANSFORM
Published 2011“…Two methods are suggested to accomplish the segmentation stage: an adaptive thresholding method and a pattern matching method. Once the ROI has been identified, an automatic cropping is performed to extract it from the original mammogram. …”
Get full text
Get full text
Thesis
