Search Results - (( using extraction method algorithm ) OR ( pre evaluation method algorithm ))
Search alternatives:
- extraction method »
- using extraction »
- method algorithm »
- pre evaluation »
-
1
EEG-and MRI-based epilepsy source localization using multivariate empirical mode decomposition and inverse solution method
Published 2018“…Therefore proposed algorithm has the advantages to localize EZ using ESL inexpensively and accurately which promotes usage of this valuable technique for epilepsy pre-surgical evaluation.…”
Get full text
Get full text
Thesis -
2
A new ant based rule extraction algorithm for web classification
Published 2011“…Methods to reduce the number of attributes and discretization are two important data pre-processing steps before the data can be used for classification activity. …”
Get full text
Get full text
Get full text
Get full text
Monograph -
3
A Fast Vertical Edge Detection Algorithm for Car License Plate Detection
Published 2009“…This thesis aims to propose a fast vertical edge detector using Vertical Edge Detection Algorithm (VEDA) and to build a Car License Plate Detection (CLPD) method. …”
Get full text
Get full text
Thesis -
4
Non-fiducial based electrocardiogram biometrics with kernel methods
Published 2017“…At classification level, Gaussian multi-class Support Vector Machine (SVM) with the One-Against-All (OAA) approach is proposed to evaluate verification performance rates of the feature extraction algorithms. …”
Get full text
Get full text
Thesis -
5
Automatic Segmentation and Classification of Skin Lesions in Dermoscopic Images
Published 2024“…The third proposed segmentation algorithm involves two pipelines for feature extraction: split & merge methods and Contextual Encoding Network (EncNet) with an attention mechanism. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Fused multivariate empirical mode decomposition (MEMD) and inverse solution method for EEG source localization
Published 2018“…High accuracy results of proposed algorithm using non-invasive and low-resolution EEG provide the potential of using this work for pre-surgical evaluation towards epileptogenic zone localization in clinics.…”
Get full text
Get full text
Article -
7
Fused multivariate empirical mode decomposition (MEMD) and inverse solution method for EEG source localization
Published 2018“…High accuracy results of proposed algorithm using non-invasive and low-resolution EEG provide the potential of using this work for pre-surgical evaluation towards epileptogenic zone localization in clinics.…”
Get full text
Get full text
Get full text
Article -
8
Fast and accurate algorithm for ECG authentication using residual depthwise separable convolutional neural networks
Published 2020“…Hamilton’s method was used for ECG beat detection, while the Residual Depthwise Separable Convolutional Neural Network (RDSCNN) algorithm was used for classification. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
9
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…To evaluate the algorithm, we conducted two experiments. …”
Get full text
Get full text
Thesis -
10
A novel framework for identifying twitter spam data using machine learning algorithms
Published 2020“…By initializing data pre-processing for clean-up, noise removal, and unpredictable unfinished data, reducing the number of features in the tweet dataset using mutual information is the study's methods. …”
Get full text
Get full text
Get full text
Article -
11
-
12
Projecting named entity tags from a resource rich language to a resource poor language
Published 2012“…The method computes the string similarity between the English words and the list of available lexemes in a pre-built lexicon that approximates the best NE mapping.The algorithm has been effectively evaluated using our own terrorism tagged corpus; it achieved satisfactory results in terms of precision, recall, and F-measure.An evaluation of the selected open source NER tool for English is also presented.…”
Get full text
Get full text
Get full text
Article -
13
Projecting named entity tags from a resource rich language to a resource poor language
Published 2013“…The algorithm has been effectively evaluated using our own terrorism tagged corpus; it achieved satisfactory results in terms of precision, recall, and F-measure. …”
Get full text
Get full text
Article -
14
Projecting named entity tags from a resource rich language to a resource poor language
Published 2013“…The algorithm has been effectively evaluated using our own terrorism tagged corpus; it achieved satisfactory results in terms of precision, recall, and F-measure. …”
Get full text
Get full text
Article -
15
Projecting named entity tags from a resource rich language to a resource poor language
Published 2013“…The algorithm has been effectively evaluated using our own terrorism tagged corpus; it achieved satisfactory results in terms of precision, recall, and F-measure. …”
Get full text
Get full text
Article -
16
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…After evaluating the results of these algorithms, a hybrid Artificial Neural Network-based Imperial Competitive Algorithm (ANN-ICA) was presented in the deployment step of the proposed methodology to identify the structural damage of illustrative structures. …”
Get full text
Get full text
Get full text
Thesis -
17
-
18
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…The method employs Semantic Tags Extraction (STSE) algorithm to extract semantic tags of an element and Element Enrichment (EERM) algorithm to enrich the elements. …”
Get full text
Get full text
Get full text
Thesis -
19
The classification of wink-based eeg signals by means of transfer learning models
Published 2021“…The implementation of pre-processing algorithms has been demonstrated to be able to mitigate the signal noises that arises from the winking signals without the need for the use signal filtering algorithms. …”
Get full text
Get full text
Thesis -
20
