Search Results - (( based evaluation method algorithm ) OR ( pattern extraction using algorithm ))

Refine Results
  1. 1

    Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier by Siow, Shien Loong

    Published 2018
    “…Classic local binary pattern (LBP) is one of the most useful feature extraction methods. …”
    Get full text
    Get full text
    Monograph
  2. 2

    A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat by Sakamat, Norzehan

    Published 2021
    “…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Opposition Based Competitive Grey Wolf Optimizer For EMG Feature Selection by Too, Jing Wei, Abdullah, Abdul Rahim

    Published 2020
    “…As for EMG feature selection, the proposed algorithms are evaluated using the EMG data acquired from the publicly access EMG database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Identifying melanoma characteristics using directional imaging algorithm and convolutional neural network on dermoscopic images / Mohammad Asaduzzaman Rasel by Mohammad Asaduzzaman , Rasel

    Published 2024
    “…Several imaging, computer vision, and pattern recognition algorithms are employed to describe five dermoscopic features. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…After evaluating the results of these algorithms, a hybrid Artificial Neural Network-based Imperial Competitive Algorithm (ANN-ICA) was presented in the deployment step of the proposed methodology to identify the structural damage of illustrative structures. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Computer-aided acute leukemia blast cells segmentation in peripheral blood images by Madhloom, H.T., Kareem, S.A., Ariffin, H.

    Published 2015
    “…The first aim is to segment the leukemic cells by mean of color transformation and mathematical morphology. The method also introduces an approach to split overlapping cells using the marker-controlled watershed algorithm based on a new marker selection scheme. …”
    Get full text
    Article
  7. 7

    An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA by Bian, Hui

    Published 2025
    “…However, these algorithms often fall short in consistently detecting and classifying network intrusions, particularly when distinctions between classes are subtle or when facing evolving attack patterns. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Towards a Malay derivational lexicon: learning affixes using expectation maximization by Sulaiman, Suriani, Gasser, Michael, Kubler, Sandra

    Published 2011
    “…We train the model with EM to find the segmentation that maximizes the probability of each morpheme. We extract the set of affix patterns produced by our algorithm and evaluate them against two references: a list of affix patterns extracted from our hand-segmented derivational wordlist and a derivational history produced by a stemmer.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9
  10. 10
  11. 11

    Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan by Diaa , Mohammed Hassan Uliyan

    Published 2016
    “…The method is based on blur metric evaluation (BME) and phase congruency (PCy). …”
    Get full text
    Get full text
    Thesis
  12. 12

    FEATURES EXTRACTION OF HEP-2 IMMUNOFLUORESCENCE PATTERNS BASED ON TEXTURE AND REGION OF INTEREST TECHNIQUES by MD HASIM, SITI MASTURA

    Published 2013
    “…Next, to design an algorithm that can automatically identify the 2 patterns of the HEp-2 cell tested using ANA. …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique by Liew, Siaw Hong

    Published 2016
    “…The IncFRNN algorithm updates the training set by employing a heuristic update method to maintain representative objects and eliminate rarely used objects. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Liver segmentation on CT images using random walkers and fuzzy c-means for treatment planning and monitoring of tumors in liver cancer patients by Moghbel, Mehrdad

    Published 2017
    “…Based on the location of the lung, the liver dome is automatically detected and the liver is then extracted by random walkers method and refined using a fuzzy level set method. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Self learning neuro-fuzzy modeling using hybrid genetic probabilistic approach for engine air/fuel ratio prediction by Al-Himyari, Bayadir Abbas

    Published 2017
    “…An enhanced hybrid Genetic Algorithm based Fuzzy Bayesian classifier (GA-FBC) was proposed to help the NFS in the rule extraction. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    The classification of motor imagery response: an accuracy enhancement through the ensemble of random subspace k-NN by Rashid, Mamunur, Bari, Bifta Sama, Hasan, Md Jahid, Mohd Azraai, Mohd Razman, Rabiu Muazu, Musa, Ahmad Fakhri, Ab. Nasir, Anwar, P. P. Abdul Majeed

    Published 2021
    “…The common spatial pattern (CSP) has been applied to extract the features from the MI response, and the effectiveness of random forest (RF)-based feature selection algorithm has also been investigated. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Improving named entity recognition accuracy of gene and protein in biomedical text by Tohidi, Hossein

    Published 2011
    “…The proposed approach is evaluated based on two measures: recall and precision which are used to calculate a balanced F-test. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Evaluation of intonation features on emphasized Malay words / Syazwani Nasaruddin by Nasaruddin, Syazwani

    Published 2017
    “…Activities in this section are, for testing part, 314 words from 2 different speakers are evaluated by using clustering method. WEKA is a set of machine learning algorithm for data mining task. …”
    Get full text
    Get full text
    Thesis
  20. 20

    New global maximum power point tracking and modular voltage equalizer topology for partially shaded photovoltaic system / Immad Shams by Immad , Shams

    Published 2022
    “…In terms of controller-based, in this work, a new global maximum power point tracking (GMPPT) algorithm based on a modified butterfly optimization algorithm (MBOA) has been proposed. …”
    Get full text
    Get full text
    Get full text
    Thesis