Search Results - (( time evaluation method algorithm ) OR ( pattern selection method algorithm ))

Refine Results
  1. 1

    Variable block based motion estimation using hexagon diamond full search algorithm (HDFSA) via block subtraction technique by Hardev Singh, Jitvinder Dev Singh

    Published 2015
    “…In the video and frame selection, pre-defined video which have different type of motion and size is used for the algorithm evaluation purpose. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Development of a new robust hybrid automata algorithm based on surface electromyography (SEMG) signal for instrumented wheelchair control by Mohd Hanafi, Muhammad Sidik

    Published 2020
    “…Based on algorithm evaluation, it shows that one control method couldn’t fit to all persons as per proven in method selection experiment. …”
    Get full text
    Get full text
    Thesis
  3. 3

    New Fast Block Matching Algorithm Using New Hybrid Search Pattern And Strategy To Improve Motion Estimation Process In Video Coding Technique by Hamid, Nurul 'Atiqah

    Published 2016
    “…These 6 algorithms are divided into 3 main methods namely Method A, Method B, and Method C depending on their search patterns and strategies. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In comparison to different single algorithms for feature selection,experimental results show that the proposed ensemble method is able to reduce dimensionality, the number of irrelevant features and produce reasonable classifier accuracy. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat by Sakamat, Norzehan

    Published 2021
    “…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Hybrid Artificial Bees Colony algorithms for optimizing carbon nanotubes characteristics by Mohammad Jarrah, Mu'ath Ibrahim

    Published 2018
    “…Chemical Vapor Deposition (CVD) is the most efficient method for CNTs production.However,using CVD method encounters crucial issues such as customization,time and cost.Therefore,Response Surface Methodology (RSM) is proposed for modeling and the ABC-βHC is proposed for optimization purpose to address such issues.The selected CNTs characteristics are CNTs yield and quality represented by the ratio of the relative intensity of the D and G-bands (ID/IG).Six case studies are generated from collected dataset including four cases of CNTs yield and one case of ID/IG as single objective optimization problems,while the sixth case represents multi-objective problem.The input parameters of each case are a subset from the set of input parameters including reaction temperature,duration,carbon dioxide flow rate,methane partial pressure,catalyst loading,polymer weight and catalyst weight.The models for the first three case studies were mentioned in the original work.RSM is proposed to develop polynomial models for the output responses in the other three cases and to identi significant process parameters and interactions that could affect the CNTs output responses.The developed models are validated using t-test,correlation and pattern matching.The predictive results have a good agreement with the actual experimental data.The models are used as objective functions in optimization techniques.For multi-objective optimization,this study proposes Desirability Function Approach (DFA) to be integrated with other proposed algorithms to form hybrid techniques namely RSM-DFA,ABC-DFA and ABC-βHC-DFA.The proposed algorithms and other selected well-known algorithms are evaluated and compared on their CNTs yield and quality.The optimization results reveal that ABC-βHC and ABC-βHC-DFA obtained significant results in terms of success rate,required time,iterations,and function evaluations number compared to other well-known algorithms.Significantly,the optimization results from this study are better than the results from the original work of the collected dataset.…”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Design Of Feature Selection Methods For Hand Movement Classification Based On Electromyography Signals by Too, Jing Wei

    Published 2020
    “…For this purpose, the feature selection (FS) method is applied to evaluate the best feature subset from a large available feature set. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Authenticating sensitive diacritical texts using residual, data representation and pattern matching methods / Saqib Iqbal Hakak by Saqib Iqbal , Hakak

    Published 2018
    “…The reason for selecting the DHQ for evaluation purposes is its availability in different styles like uthmani and plain Arabic style that makes evaluation possible based on our first method. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Optimal placement and sizing of distributed generation in radial distribution networks using particle swarm optimization and forward backward sweep method by Lawal, Sani Mohammed

    Published 2012
    “…PSO is among the meta-heuristics search methods like Genetic Algorithm (GA) but has been found to be computationally efficient, because it uses less number of functions for evaluation compared to GA that has genetic operators (Selection, crossover and mutation) and also the computational effort (time) required by PSO to arrive at high quality solutions is less than the effort required to the same high quality solutions by other heuristic search methods. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique by Liew, Siaw Hong

    Published 2016
    “…The correlation-based feature selection (CFS) method was used to select representative WPD vector subset to eliminate redundancy before combining with other features. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Prediction of Alzheimer disease using improved MMSE ensemble regressor based on magnetic resonance images by Farzan, Ali

    Published 2015
    “…A minimal set of feature who passed the above criteria and can differentiate all of cognitive score pairs is selected by using a genetic search algorithm. Chernoff bound as upper bound of Bayes error for class separability is computed for evaluating the feature selection method. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Partitional clustering algorithms for highly similar and sparseness y-short tandem repeat data / Ali Seman by Seman, Ali

    Published 2013
    “…Six Y-STR data sets were used as a benchmark to evaluate the performances of the algorithm against the other eight partitional clustering algorithms. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Spatial-temporal analysis using two-stage clustering and GIS-based MCDM to identify potential market regions by Ernawati, Kamal Baharin, Safiza Suhana, Kasmin, Fauziah

    Published 2021
    “…Subsequently, the origin schools' regencies/cities were clustered using the k- prototypes algorithm based on their time-series pattern category, the consistency in sending students, average cumulative grade point average (CGPA), and dropout (DO) rate. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Adaptive feature selection for denial of services (DoS) attack by Yusof, Ahmad Riza'ain, Udzir, Nur Izura, Selamat, Ali, Hamdan, Hazlina, Abdullah @ Selimun, Mohd Taufik

    Published 2017
    “…Adaptive detection is the learning ability to detect any changes in patterns in intrusion detection systems. In this paper, we propose combining two techniques in feature selection algorithm, namely consistency subset evaluation (CSE) and DDoS characteristic features (DCF) to identify and select the most important and relevant features related DDoS attacks. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Adaptive Similarity Component Analysis in Nonparametric Dynamic Environment by Sojodishijani, Omid

    Published 2011
    “…From a dimensionality reduction evaluation aspect, the average misclassification error of the proposed method in low-rank feature space is 9.6% and same error rate for three other well-known feature extraction methods is 21.21%. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Evolving fuzzy grammar for crime texts categorization by Mohd Sharef, Nurfadhlina, Martin, Trevor

    Published 2015
    “…Results show that the EFG algorithm produces results that are close in performance with the other ML methods while being highly interpretable, easily integrated into a more comprehensive grammar system and with lower model retraining adaptability time.…”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Hybrid harmony search-artificial intelligence models in credit scoring by Goh, Rui Ying

    Published 2019
    “…Instead of the conventional Grid Search (GS) and manual tuning (MT) approaches, automated tuning with metaheuristics approach (MA) have also shown to be effective in this task. Genetic Algorithm (GA) has been the dominant method and other MA being attempted recently has shown the potential of MA to perform hyperparameters tuning. …”
    Get full text
    Get full text
    Thesis