Search Results - (( time evaluation method algorithm ) OR ( rule extraction method algorithm ))*

Refine Results
  1. 1

    Non-fiducial based electrocardiogram biometrics with kernel methods by Hejazi, Maryamsadat

    Published 2017
    “…At classification level, Gaussian multi-class Support Vector Machine (SVM) with the One-Against-All (OAA) approach is proposed to evaluate verification performance rates of the feature extraction algorithms. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Development of a multi criteria decision support system using convolutional neural network and jaya algorithm for water resources management / Chong Kai Lun by Chong , Kai Lun

    Published 2021
    “…As for the optimization process, the reservoir operation rule was derived using a meta-heuristic algorithm at the monthly interval. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Fuzzy logic-based hill climbing technique for photovoltaic maximum power point tracking converter by Taghvaee, Mohammad Hossein

    Published 2013
    “…Further experimental setup was carried out for comparative evaluation and the MPPT algorithm was implemented to performance verification of the algorithm by using digital signal processor (TMS320F28335). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Projecting named entity tags from a resource rich language to a resource poor language by Zamin, Norshuhani, Oxley, Alan, Abu Bakar, Zainab

    Published 2012
    “…The method computes the string similarity between the English words and the list of available lexemes in a pre-built lexicon that approximates the best NE mapping.The algorithm has been effectively evaluated using our own terrorism tagged corpus; it achieved satisfactory results in terms of precision, recall, and F-measure.An evaluation of the selected open source NER tool for English is also presented.…”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Projecting named entity tags from a resource rich language to a resource poor language by Zamin, N., Oxley, A., Bakar, Z.A.

    Published 2013
    “…This article focuses on the person (PER), organization (ORG) and location (LOC) entities for a Malay journalistic corpus of terrorism. A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism. …”
    Get full text
    Get full text
    Article
  7. 7

    Projecting named entity tags from a resource rich language to a resource poor language by Zamin, N., Oxley, A., Bakar, Z.A.

    Published 2013
    “…This article focuses on the person (PER), organization (ORG) and location (LOC) entities for a Malay journalistic corpus of terrorism. A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism. …”
    Get full text
    Get full text
    Article
  8. 8

    Projecting named entity tags from a resource rich language to a resource poor language by Zamin, N., Oxley, A., Bakar, Z.A.

    Published 2013
    “…This article focuses on the person (PER), organization (ORG) and location (LOC) entities for a Malay journalistic corpus of terrorism. A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism. …”
    Get full text
    Get full text
    Article
  9. 9

    Topic identification using filtering and rule generation algorithm for textual document by Nurul Syafidah, Jamil

    Published 2015
    “…The rule generation algorithm (TopId) is proposed to identify topic for each verse based on the extracted terms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Real-time oil palm fruit bunch ripeness grading system using image processing techniques by Alfatni, Meftah Salem M.

    Published 2013
    “…For example, the rule-based ROIs for statistical color feature extraction with KNN classifier at 94% were chosen. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach by Khan, T., Singh, K., Shariq, M., Ahmad, K., Savita, K.S., Ahmadian, A., Salahshour, S., Conti, M.

    Published 2023
    “…Simulation experiments exhibit the effectiveness of the proposed trust evaluation method in terms of change in trust values, malicious nodes detection (94), FNR (0.9), F1-Score (0.6), and accuracy (92) in the presence of 50 malicious nodes. …”
    Get full text
    Get full text
    Article
  13. 13

    Compressing and improving fuzzy rules using genetic algorithm and its application to fault detection by Yap K.S., Wong S.Y., Tiong S.K.

    Published 2023
    “…The improved model is applied to two benchmark problems, and the rules extracted are analyzed, discussed and compared with other published methods. …”
    Conference Paper
  14. 14

    The framework of weighted subset-hood Mamdani fuzzy rule based system rule extraction (MFRBS-WSBA) for forecasting electricity load demand by Mansor, Rosnalini, Mat Kasim, Maznah, Othman, Mahmod

    Published 2016
    “…The objective of this paper is to show the fourth step in the framework which applied the new electricity load forecasting rule extraction by WSBA method. Electricity load demand in Malaysia data is used as numerical data in this framework.These preliminary results show that the WSBA method can be one of alternative methods to extract fuzzy rules for forecast electricity load demand…”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    The framework of weighted subset-hood Mamdani fuzzy rule based system rule extraction (MFRBS-WSBA) for forecasting electricity load demand by Mansor, R., Kasim, M.M., Othman, M.

    Published 2016
    “…These preliminary results show that the WSBA method can be one of alternative methods to extract fuzzy rules for forecast electricity load demand. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Hybrid subjective evaluation method using weighted subsethood - based (WSBA) rule generation algorithm by Othman, Mahmod, Khalid, Shaiful Annuar, Abdullah, Fader, Amir Hamzah, Shezrin Hawani, Ku-Mahamud, Ku Ruhana

    Published 2013
    “…The use of fuzzy rules, which were extracted directly from input data through Weighted Subsethood-based (WSBA) Rule Generation Algorithm.WSBA rule generation use the subsethood values to generate the weights which finally produced the fuzzy general rules.The rules generated through the data provided knowledge in developed fuzzy rule The fuzzy rules embedded in the framework of subjective evaluation method showed advantages in generalizing the evaluation of the performance achievement, where the evaluation process can be conducted consistently in producing good evaluation results with the use of the membership set score.The results from the numerical examples are comparable to other fuzzy evaluation methods, even with the use of small rule size.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining. by Saeed, Walid

    Published 2005
    “…The extraction of minimum rules operation is conducted after the default rules have been generated in order to obtain the most useful discovered rules. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A weighted subsethood mamdani fuzzy rules based system rule extraction (MFRBS-WSBA) for forecasting electricity load demand – a framework by Mansor, Rosnalini, Mat Kasim, Maznah, Othman, Mahmod

    Published 2016
    “…Specifically, this paper proposed two frameworks: MFRBSWSBA and WSBA framework where the WSBA is embedded in MFRBS-WSBA (fourth step in MFRBS-WSBA).The objective of this paper is to show the fourth step in the MFRBS-WSBA framework which applied the new electricity load forecasting rule extraction by WSBA method.We apply the proposed WSBA framework in Malaysia electricity load demand data as a numerical example in this paper.These preliminary results show that the WSBA framework can be one of alternative methods to extract fuzzy rules for forecast electricity load demand where the proposed method provide a simple to interpret the fuzzy rules and also offer a new direction to interpret the fuzzy rules compared to classical fuzzy rules…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Overview of biomedical relations extraction using hybrid rule-based approaches. by Abdul Kadir, Rabiah, Bokharaeian, Behrouz

    Published 2013
    “…However, in this work we will discuss the overview a combination of three methods called as hybrid rule-based to extract complex and simple relations.…”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Frequent Lexicographic Algorithm for Mining Association Rules by Mustapha, Norwati

    Published 2005
    “…The primary concept of association rule algorithms consist of two phase procedure. In the first phase, all frequent patterns are found and the second phase uses these frequent patterns in order to generate all strong rules. …”
    Get full text
    Get full text
    Thesis