Search Results - (( group evaluation method algorithm ) OR ( gram extraction method algorithm ))

Refine Results
  1. 1
  2. 2

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…The method employs Semantic Tags Extraction (STSE) algorithm to extract semantic tags of an element and Element Enrichment (EERM) algorithm to enrich the elements. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Hybrid group decision making method based on multi-granular information using fusion algorithms and consistent fuzzy preference relation / Siti Amnah Mohd Ridzuan by Mohd Ridzuan, Siti Amnah

    Published 2017
    “…Both algorithm been illustrated in textbook selection. The proposed methods can be utilized as another option to solve a decision making problem.…”
    Get full text
    Get full text
    Thesis
  4. 4

    Reduced Set Kernel Principal Component Analysis (Rskpca) Algorithm for Palm Print Based Mobile Biometric System by Ibrahim, Noor Salwani

    Published 2015
    “…A new approach in feature extraction called Reduced-Set Kernel Principal Component Analysis (RSKPCA) is proposed to speed up the processing in feature extraction. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Intelligent deep machine learning cyber phishing URL detection based on BERT features extraction by Muna Elsadig, Ashraf Osman Ibrahim Elsayed, Shakila Basheer, Manal Abdullah Alohali, Sara Alshunaifi, Haya Alqahtani, Nihal Alharbi, Wamda Nagmeldin

    Published 2022
    “…Next, a deep convolutional neural network method was utilised to detect phishing URLs. It was used to constitute words or n-grams in order to extract higher-level features. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Evaluation of the effectiveness of clustering algorithm in retrieving Malay documents / Aminah Mahmood by Mahmood, Aminah

    Published 2004
    “…First experiment use exact match, which is no method, is applied. Second experiment use stenmiing method. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Clustering of Chemical Compounds using Unsupervised Neural Networks Algorithms: a comparison by Zeb Shah, Jehan, Salim, Naomie

    Published 2006
    “…The results of the SOM neural networks, Wards and Group-Average methods are evaluated for the clustering of different biologically active chemical molecules that can be used as drug like compounds based on topological descriptors. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Clustering of chemical compounds using unsupervised neural networks algorithms : a comparison by Zeb Shah, Jehan, Salim, Naomie

    Published 2006
    “…The results of the SOM neural networks, Wards and Group-Average methods are evaluated for the clustering of different biologically active chemical molecules that can be used as drug like compounds based on topological descriptors. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Clustering ensemble learning method based on incremental genetic algorithms by Ghaemi, Reza

    Published 2012
    “…In order to address the above mentioned challenges, this study is devoted towards the development of a clusterer and a clustering ensemble learning method based on incremental genetic algorithms addressing group unlabeled samples. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Group method of data handling with artificial bee colony in combining forecasts by Yahya, Nurhaziyatul Adawiyah, Samsudin, Ruhaidah, Darmawan, Irfan, Kasim, Shahreen

    Published 2018
    “…This study is done by combining individual forecasts of Group Method of Data Handling models using the weighted-based combine approach. …”
    Get full text
    Get full text
    Article
  12. 12

    Multi-objective clustering algorithm using particle swarm optimization with crowding distance (MCPSO-CD) by Rashed, Alwatben Batoul, Hamdan, Hazlina, Mohd Sharef, Nurfadhlina, Sulaiman, Md Nasir, Yaakob, Razali, Abubakar, Mansir

    Published 2020
    “…The results of the evaluation show that the proposed approach exemplified the state-of-the-art method with significant differences in most of the datasets tested.…”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Enhancing performance of XTS cryptography mode of operation using parallel design by Ahmed Alomari, Mohammad

    Published 2009
    “…Performance evaluation shows that XTS exhibits faster speed when an RC6 encryption algorithm is used, compared to other encryption algorithms such as AES and Twofish. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Evaluating A New Adaptive Group Lasso Imputation Technique For Handling Missing Values In Compositional Data by Tian, Ying

    Published 2024
    “…The complexity of compositional data with missing values renders traditional estimation methods inadequate. In this thesis, a compositional data imputation method designed based on LASSO is proposed combining group LASSO and adaptive LASSO analysis methods. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Grouping based radio frequency identification anti-collision protocols for dense internet of things application by Umelo, Nnamdi H., Noordin, Nor K., A. Rasid, Mohd Fadlee, Geok, Tan K., Hashim, Fazirulhisyam

    Published 2022
    “…This paper analyzes selected grouping-based algorithms. Their underlining principles are discussed including their tag estimation methods. …”
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Windows-Based bandwidth allocation on optical networks by Mahadevan, V., Yu, W., Zhou, J.

    Published 2009
    “…Finally in this survey, we found some roles and principles in Router-Based dynamic bandwidth allocation methods which explain them separately. We hope in the next article we will make a comparison table among static and dynamic bandwidth allocations algorithms and propose an algorithm on dynamic bandwidth allocation and evaluate our proposed algorithm.…”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Three-dimensional coverage control for multi-unmanned aerial vehicle by Siow, Wen Hao

    Published 2024
    “…Objectives of this project are achieved by reviewing existing coverage control methods, developing, and evaluating the proposed 3D coverage control algorithm, demonstrating its effectiveness, and potential applicability in real-life scenarios.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    Modeling and Analysis of New Hybrid Clustering Technique for Vehicular Ad Hoc Network by Abdulrazzak H.N., Hock G.C., Mohamed Radzi N.A., Tan N.M.L., Kwong C.F.

    Published 2023
    “…Finally, the classical K-Means algorithm is applied to create the vehicle clusters for each covering rough set group. …”
    Article