Search Results - (( pattern ((based algorithm) OR (_ algorithm)) ) OR ( between working algorithm ))
Search alternatives:
- working algorithm »
- between working »
-
1
Improving explicit aspects extraction in sentiment analysis using optimized ruleset / Mohammad Ahmad Jomah Tubishat
Published 2019“…In addition, extraction rules including either pattern-based or dependency-based rules should be selected in a correct way to remove the irrelevant rules and minimize the extraction errors Thus, in this study, to select the most effective extraction rules, an improved version of Whale Optimization Algorithm (IWOA) is developed and applied to a full set of rules. …”
Get full text
Get full text
Get full text
Thesis -
2
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…Recently, several effective supervised and unsupervised machine learning methods have been developed in the domain of topics extraction. However, less works have been conducted in applying multiobjective based algorithm for topic extraction. …”
Get full text
Get full text
Article -
3
Autonomous flight algorithm of a quadcopter sensing system for methane gas concentration measurements at landfill site
Published 2018“…This algorithm was proposed in this thesis based on a special mathematical calculation model, which has the ability to decide the spacing between adjacent straight-line trajectories within a user defined area, this prevents the quadcopter from crashing during the survey due to reasons of overcapability. …”
Get full text
Get full text
Thesis -
4
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…Recently, several effective supervised and unsupervised machine learning methods have been developed in the domain of topics extraction. However, less works have been conducted in applying multiobjective based algorithm for topic extraction. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
EEG EYE STATE IDENTIFICATION BASED ON STATISTICAL FEATURES AND COMMON SPATIAL PATTERN
Published 2019“…Besides, common spatial pattern (CSP) is the well-known method for classification algorithm in the BCI field. …”
Get full text
Get full text
Final Year Project -
6
Development of a Web Access Control Technique Based User Access Behavior
Published 2004“…A set of algorithms is used for mining user access behavior, preprocessing tasks for data preparation, association rules for defining the rules that describe the correlation between web user access transaction entries patterns, and sequential pattern discovery for finding the sequences of the web user access transaction entries pattern using Prefixspan (Pattern growth via frequent sequence lattice) algorithms. …”
Get full text
Get full text
Thesis -
7
Animal voice recognition for identification (ID) detection system
Published 2011“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
8
Dog voice identification (ID) for detection system
Published 2012“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
9
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…In order to construct an optimal collision-free path, an optimization step was included to find out the minimum distance within the candidate points that have been determined by GLS while adhering to particular constraint's rules and avoiding obstacles. The proposed algorithm will switch its working pattern based on the goal minimum and boundary maximum index distances. …”
Get full text
Thesis -
10
Identification of Freeform Depression Feature in a Part Using Vertex Attributes From Feature Volume / Pramod S Kataraki and Mohd Salman Abu Mansor
Published 2018“…Third, a lofting operation is performed between new faces to generate feature volume for the depression feature and fourth, the algorithm utilizes vertex attributes of feature volume to recognize feature type. …”
Get full text
Get full text
Article -
11
Mining dense data: Association rule discovery on benchmark case study
Published 2016“…In this article, we present comparison result between Apriori and FP-Growth algorithm in generating association rules based on a benchmark data from frequent itemset mining data repository. …”
Get full text
Article -
12
Identifying melanoma characteristics using directional imaging algorithm and convolutional neural network on dermoscopic images / Mohammad Asaduzzaman Rasel
Published 2024“…Several imaging, computer vision, and pattern recognition algorithms are employed to describe five dermoscopic features. …”
Get full text
Get full text
Get full text
Thesis -
13
Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication
Published 2021“…The limitation of the available works on min-sum based LDPC code decoding algorithm specifically for DF protocol relay system motivated this research. …”
Get full text
Get full text
Get full text
Thesis -
14
Optimizing Cloud Storage Costs: Introducing the Pre-Evaluation-Based Cost Optimization (PECSCO) Mechanism
Published 2025“…The core of the algorithm utilizes a Genetic Algorithm (GA) to find the optimal position for the first evaluator by minimizing the total distance between this evaluator and all CCTV nodes, aiming for surveillance efficiency. …”
Conference paper -
15
An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding
Published 2020“…Sparse representation prevents over-fitting in the classifier by eliminating redundancies and evaluating high-frequency patterns between feature vectors. Performance of proposed methods surpass the classic bag of words algorithm for plant identification tasks.…”
Get full text
Get full text
Get full text
Article -
16
EEG Eye State Identification based on Statistical Feature and Common Spatial Pattern Filter
Published 2019“…These indicate that both methods give good discrimination of the eye state condition but on it own, will not be sufficient to produce good classification accuracy. Hence, this work aims to develop an algorithm using statistical-CSP feature for eye state classification from EEG signal. …”
Get full text
Get full text
Conference or Workshop Item -
17
EEG Eye State Identification based on Statistical Feature and Common Spatial Pattern Filter
Published 2019“…These indicate that both methods give good discrimination of the eye state condition but on it own, will not be sufficient to produce good classification accuracy. Hence, this work aims to develop an algorithm using statistical-CSP feature for eye state classification from EEG signal. …”
Get full text
Get full text
Conference or Workshop Item -
18
New global maximum power point tracking and modular voltage equalizer topology for partially shaded photovoltaic system / Immad Shams
Published 2022“…In terms of controller-based, in this work, a new global maximum power point tracking (GMPPT) algorithm based on a modified butterfly optimization algorithm (MBOA) has been proposed. …”
Get full text
Get full text
Get full text
Thesis -
19
Understanding the purchasing behavior of Agri-food commodities in Malaysia using the Apriori algorithm
Published 2024“…The paper presents the findings obtained related to the application of Apriori algorithm to investigate the relationship between agri-food commodities bought in Malaysia for the whole year 2022. …”
Get full text
Get full text
Get full text
Book Section -
20
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…Datasets of well-known SQL injection attack patterns and AI/ML models intended for cybersecurity anomaly detection are among the resources underexplored, these findings show the potential for boosting detection capabilities by deploying ML and AI-based security solutions, with some algorithms scoring up to an 80 percent success rate in identifying SQL injections. …”
Get full text
Get full text
Get full text
Article
