Search Results - (( binary classification rules algorithm ) OR ( using identification based algorithm ))
Search alternatives:
- binary classification »
- classification rules »
- using identification »
- identification based »
- rules algorithm »
-
1
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
Get full text
Get full text
Article -
2
Decision-Level Fusion Scheme For Nasopharyngeal Carcinoma Identification Using Machine Learning Techniques
Published 2020“…We have implemented the fusion of the three image texture-based schemes (local binary patterns, the first-order statistics histogram properties, and histogram of gray scale) at the decision level and tested the performance of this scheme using the same experimental setup in the previous section for simple scorelevel fusion, but for comparison, We used the classifiers methods which are support vector machines (SVM), k-nearest neighbors’ algorithm, and artificial neural network (ANN). …”
Get full text
Get full text
Get full text
Article -
3
An improved pixel-based and region-based approach for urban growth classification algorithms / Nur Laila Ab Ghani
Published 2015“…The urban growth images obtained are analysed to improve existing classification algorithms. The improved algorithm is constructed by adding new parameter and classification rule to existing algorithm. …”
Get full text
Get full text
Thesis -
4
Genetic algorithm fuzzy logic for medical knowledge-based pattern classification
Published 2018“…This research proposed an algorithm named Genetic Algorithm Fuzzy Logic (GAFL) with Pittsburg approach for rules learning and induction in genetic fuzzy system knowledge discovery. …”
Get full text
Get full text
Article -
5
Text Extraction Algorithm for Web Text Classification
Published 2010“…This study provides a text extraction algorithm for web text classification. The extraction algorithm consists of three phases namely web page extraction, rule formulation, and algorithm validation. …”
Get full text
Get full text
Get full text
Thesis -
6
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
Get full text
Get full text
Thesis -
7
Genetic algorithm fuzzy logic for medical knowledge-based pattern classification
Published 2023“…This research proposed an algorithm named Genetic Algorithm Fuzzy Logic (GAFL) with Pittsburg approach for rules learning and induction in genetic fuzzy system knowledge discovery. …”
Article -
8
Overview of biomedical relations extraction using hybrid rule-based approaches.
Published 2013“…However, each of them was implemented in three major types of techniques separately i.e.co-occurrence,kernel based and rule based methods. There are many variants of these algorithms have been developed but the combination of it has not been verified yet. …”
Get full text
Get full text
Get full text
Article -
9
Behavior Recognition In Video Surveillance System For Indoor Public Areas Using Artificial Immune System
Published 2008“…Also, the robust algorithm with hands of artificial immune system rules like binary hamming shape-space and advance detector structure with fast decision making to detect three abnormal behaviors such as entering the forbidden area, standing more than threshold and running was implemented The result obtained showed the improvement in the duration for each phase when compared with previous methods in image segmentation like mixture of Gaussian and behavior recognition like and/Or tree or neural networks.…”
Get full text
Get full text
Thesis -
10
Enhanced Adaptive Neuro-Fuzzy Inference System Classification Method for Intrusion Detection
Published 2024“…Additionally, standard deviation and proposed adaptive K-means algorithms have been employed to minimize the generated rules by ANFIS from the proposed hybrid models. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
-
12
Hybrid DE-PEM algorithm for identification of UAV helicopter
Published 2014“…Design/methodology/approach – In this study, flight data were collected and analyzed; MATLAB-based system identification algorithm was developed using DE and PEM; parameterized state-space model parameters were estimated using the developed algorithm and model dynamic analysis. …”
Get full text
Get full text
Get full text
Article -
13
Identification of continuous-time hammerstein system using sine cosine algorithm
Published 2019“…This paper presents the development of identification of continuous-time Hammerstein systems based on Sine Cosine Algorithm (SCA). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Thermoelectric cooler identification based on continuous-time hammerstein model using metaheuristics algorithm
Published 2021“…This paper presents the identification of the Thermoelectric Cooler (TEC) plant using a novel metaheuristic called hybrid Multi-Verse Optimizer with Sine Cosine Algorithm (hMVOSCA) based continuous-time Hammerstein model. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Identification of power poles based on satellite stereo images using graph-cut algorithm
Published 2015“…In conclusion, based on the results, Our proposed Graph-Cut algorithm produces more accurate disparity maps than the existing matching algorithm used for disparity calculation.…”
Get full text
Get full text
Conference or Workshop Item -
16
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…A deterministic mutation-based algorithm is introduced to overcome this problem. …”
Get full text
Get full text
Get full text
Article -
17
Date store management in sliding window based on-line identification algorithms
Published 2001Get full text
Get full text
Conference or Workshop Item -
18
Data mining based damage identification using imperialist competitive algorithm and artificial neural network
Published 2018“…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
Get full text
Get full text
Article -
19
Identification of the thermoelectric cooler using hybrid multi-verse optimizer and sine cosine algorithm based continuous-time Hammerstein model
Published 2021“…This paper presents the identification of the ThermoElectric Cooler (TEC) plant using a hybrid method of Multi-Verse Optimizer with Sine Cosine Algorithm (hMVOSCA) based on continuous-time Hammerstein model. …”
Get full text
Get full text
Get full text
Article -
20
Smoothed functional algorithm with norm-limited update vector for identification of continuous-time fractional-order Hammerstein Models
Published 2024“…This article proposes an identification method of continuous-time fractional-order Hammerstein model using smoothed functional algorithm with a norm-limited update vector (NL-SFA). …”
Get full text
Get full text
Get full text
Article
