Search Results - (((( pattern matching algorithm ) OR ( e learning algorithm ))) OR ( patterns among algorithm ))

Refine Results
  1. 1

    Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation by Mat Jani H., Lee S.P.

    Published 2023
    Subjects: “…Knuth-Morris-Pratt (KMP) pattern matching algorithm…”
    Conference paper
  2. 2

    Medical Image Analysis Using Deep Learning and Distribution Pattern Matching Algorithm by Jaber M.M., Yussof S., Elameer A.S., Weng L.Y., Abd S.K., Nayyar A.

    Published 2023
    “…Automation; Complex networks; Computational complexity; Deep learning; Image analysis; Medical imaging; Pattern matching; Pixels; Distribution pattern-matching rule; Distribution patterns; Gray wolf-optimized deep convolution network; Gray wolves; Learning patterns; Matching rules; Medical fields; Medical image analysis; Pattern matching algorithms; Pattern-matching; Convolution…”
    Article
  3. 3
  4. 4
  5. 5

    Investigation of block matching algorithm for video coding by Faizul Hadi Mohamad Jamil

    Published 2013
    “…The Spatial model exploits the redundancy in a single video frame (I frame) while the temporal model exploits the redundancy among frames (P frame). The temporal model deals with motion estimation (ME) and motion compensation (MC) algorithm with the matching technique called “Block Matching Algorithm” (BMA) to produce the next encoded video frame with motion vector. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Improved GART neural network model for pattern classification and rule extraction with application to power systems by Yap K.S., Lim C.P., Au M.T.

    Published 2023
    “…IGART enhances the dynamics of GART in several aspects, which include the use of the Laplacian likelihood function, a new vigilance function, a new match-tracking mechanism, an ordering algorithm for determining the sequence of training data, and a rule extraction capability to elicit if-then rules from the network. …”
    Article
  8. 8

    Composing multi-relations association rules from crowdsourcing remuneration data by Siti Salwa Salleh, Nurhayati Zakaria, Norjansalika Janom, Syaripah Ruzaini Syed Aris, Noor Habibah Arshad

    Published 2022
    “…The data comprise a lot of redundancies, therefore an apriori algorithm is used to normalise it by removing redundancies and then extracting significant patterns. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN by SARI, YUNITA SARI

    Published 2011
    “…For the third contribution, we have applied the Self-Training algorithm which is one of the semi-supervised machines learning technique. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Improving named entity recognition accuracy of gene and protein in biomedical text by Tohidi, Hossein

    Published 2011
    “…In this study, to handle the above issues in recognizing gene and protein names, a statistical similarity measurement as a pattern matching function is proposed. Our approach is based on an assumption that a named entity occurs among a noun group which is extracted using Brill Part of Speech tagger. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Music Recommender System Using Machine Learning Content-Based Filtering Technique by Foong, Kin Hong

    Published 2022
    “…These algorithms identify hidden patterns or data groupings without the assistance of a human. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat by Sakamat, Norzehan

    Published 2021
    “…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
    Get full text
    Get full text
    Thesis
  14. 14

    STATISTICAL FEATURE LEARNING THROUGH ENHANCED DELAUNAY CLUSTERING AND ENSEMBLE CLASSIFIERS FOR SKIN LESION SEGMENTATION AND CLASSIFICATION by Adil H., Khan, Dayang Nurfatimah, Awang Iskandar, Jawad F., Al-Asad, SAMIR, EL-NAKLA, SADIQ A., ALHUWAIDI

    Published 2021
    “…Moreover, skin lesion images are clustered based on fused color, pattern and shape based features. A boost ensemble learning algorithm using Support Vector Machines (SVM) as initial classifiers and Artificial Neural Networks (ANN) as a final classifier is employed to learn the patterns of different skin lesion class features. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Identifying Cyberspace Users� Tendency in Blog Writing Using Machine Learning Algorithms by AbuSalim, S.W.G., Mostafa, S.A., Mustapha, A., Ibrahim, R., Wahab, M.H.A.

    Published 2023
    “…There is a specific proportion between blog features and bloggersâ�� tendency to social, political, and cultural patterns of different countries and nations that create trends among the bloggers in these countries. …”
    Get full text
    Get full text
    Article
  17. 17

    Herb recognition for mobile apps / Jumriyanie Baba by Baba, Jumriyanie

    Published 2017
    “…Two texture features have been experimented that are Local Binary Pattern (LBP) and Histogram of Oriented Gradient (HOG). …”
    Get full text
    Get full text
    Thesis
  18. 18

    Performance Analysis Of Different Hash Functions Using Bloom Filter For Network Intrusion Detection Systems In 32-Bit And 64-Bit Computer Operation Mode. by Tan , Beng Ghee

    Published 2016
    “…A Bloom Filter is an array of bits that determine whether a given structure of information belongs to it. A Bloom Filter pattern matching algorithm with fast hashing functions is developed for 32-bit and 64-bit computer system. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Application of machine learning and artificial intelligence in detecting SQL injection attacks by Md Sultan, Abu Bakar, Agiliga, Nwabudike Augustine, Osman, Mohd Hafeez Bin, Sharif, Khaironi Yatim

    Published 2024
    “…Datasets of well-known SQL injection attack patterns and AI/ML models intended for cybersecurity anomaly detection are among the resources underexplored, these findings show the potential for boosting detection capabilities by deploying ML and AI-based security solutions, with some algorithms scoring up to an 80 percent success rate in identifying SQL injections. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    COMPUTER AIDED SYSTEM FOR BREAST CANCER DIAGNOSIS USING CURVELET TRANSFORM by MOHAMED ELTOUKHY, MOHAMED MESELHY

    Published 2011
    “…Two methods are suggested to accomplish the segmentation stage: an adaptive thresholding method and a pattern matching method. Once the ROI has been identified, an automatic cropping is performed to extract it from the original mammogram. …”
    Get full text
    Get full text
    Thesis