Search Results - (( rate evaluation method algorithm ) OR ( gram extraction method algorithm ))

Refine Results
  1. 1

    Reduced Set Kernel Principal Component Analysis (Rskpca) Algorithm for Palm Print Based Mobile Biometric System by Ibrahim, Noor Salwani

    Published 2015
    “…However, in order to execute mobile biometric system, efficient processing time and storage are some of the important factors that need to be considered. In this research, algorithms involving palm print feature processing are evaluated so as to obtain optimum time and memory consumption. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…The method employs Semantic Tags Extraction (STSE) algorithm to extract semantic tags of an element and Element Enrichment (EERM) algorithm to enrich the elements. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Intelligent deep machine learning cyber phishing URL detection based on BERT features extraction by Muna Elsadig, Ashraf Osman Ibrahim Elsayed, Shakila Basheer, Manal Abdullah Alohali, Sara Alshunaifi, Haya Alqahtani, Nihal Alharbi, Wamda Nagmeldin

    Published 2022
    “…Next, a deep convolutional neural network method was utilised to detect phishing URLs. It was used to constitute words or n-grams in order to extract higher-level features. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Standardizing and weighting the evaluation criteria of many-objective optimization competition algorithms based on fuzzy delphi and fuzzy-weighted zero-inconsistency methods by Salih, Rawia Tahrir

    Published 2021
    “…The evaluation criteria of Many Objective Optimization algorithm (MaOO) play a critical role in evaluating the competition MaOO algorithms. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Improved Switching-Basedmedian Filter For Impulse Noise Removal by Teoh, Sin Hoong

    Published 2013
    “…Based on the evaluations from root mean square error (RMSE), false positive detection rate, false negative detection rate, mean structure similarity index (MSSIM), processing time, and visual inspection, it is shown that the proposed method is the best method when compared with seven other state-of-the art median filtering methods.…”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Optimising neural network training efficiency through spectral parameter-based multiple adaptive learning rates by Yeong, Lin Koay, Hong, Seng Sim, Yong, Kheng Goh, Sing, Yee Chua, Wah, June Leong

    Published 2024
    “…Selected datasets are used to evaluate the performance of the proposed method. The proposed algorithm is used to train the neural networks with di"erent hidden layer sizes and di"erent neurons. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Whole brain radiation therapy verification using 2D gamma analysis method by Zainodin, Nik Nurul Afina Wan

    Published 2020
    “…The CC algorithm gave the passing rate of 87.25% using 3 mm/3% (DTA/DD) method than PB algorithm with 79.95%. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Objective evaluation of speech enhancement using compressive sensing algorithm by Sulong, Amart, Gunawan, Teddy Surya, Khalifa, Othman Omran, Chebil, Jalel

    Published 2013
    “…Perceptual evaluation of speech quality (PESQ) is an objective evaluation of speech enhancement algorithm used to measure the enhanced speech quality. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12
  13. 13

    Satellite attitude determination utilizing measurement sensor data and kalman filtering by Samaan, Malak A., Abdelrahman, Mohammad

    Published 2006
    “…This algorithm utilizes the three axis rate gyros for the satellite angular rate data and star camera line-of-sight measurements. …”
    Get full text
    Get full text
    Article
  14. 14

    Non-fiducial based electrocardiogram biometrics with kernel methods by Hejazi, Maryamsadat

    Published 2017
    “…At classification level, Gaussian multi-class Support Vector Machine (SVM) with the One-Against-All (OAA) approach is proposed to evaluate verification performance rates of the feature extraction algorithms. …”
    Get full text
    Get full text
    Thesis
  15. 15

    An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi by Suhaimi, Hamizan

    Published 2021
    “…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem by Mohd Pozi, Muhammad Syafiq

    Published 2016
    “…There are two methods in dealing with imbalanced classification problem, which are based on data or algorithmic level. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    An enhanced opposition-based firefly algorithm for solving complex optimization problems by Ling, Ai Wong, Hussain Shareef, Azah Mohamed, Ahmad Asrul Ibrahim

    Published 2014
    “…This study introduces some methods to enhance the performance of original fi refl y algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
    Get full text
    Get full text
    Thesis
  20. 20