Search Results - (( construct extraction method algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Non-fiducial based electrocardiogram biometrics with kernel methods by Hejazi, Maryamsadat

    Published 2017
    “…A new non-fiducial approach is proposed for feature extraction. This approach constructs an algorithm by combining autocorrelation (AC) and Kernel Principal Component Analysis (KPCA) techniques. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Information extraction using Link Grammar by N., Zamin

    Published 2009
    “…This study is looking into the opportunity to extract important facts from the PETRONAS Health Safety and Environment (HSE) reports for database construction and analysis purpose. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Steep slope DEM model construction based on the unmanned aerial vehicle (UAV) images by Xi, Wenfei, Li, Dongsheng

    Published 2017
    “…Finally, stereo pair splicing method is used to generate orthogonal images and construct DEM model. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Extracting crown morphology with a low-cost mobile LiDAR scanning system in the natural environment by Wang, Kai, Zhou, Jun, Zhang, Wenhai, Zhang, Baohua

    Published 2021
    “…Finally, morphological parameters of the canopy, such as crown height, crown diameter, and crown volume, are extracted using statistical and voxel methods. To verify the algorithm, a total of 43 trees in multiple plots of the campus were tested and compared. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Automatic Road Network Recognition and Extraction for Urban Planning by Bong, David B L, Lai, K.C., Joseph, A.

    Published 2009
    “…The extracted road regions are validated by using a segmentation method. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9

    Aco-based feature selection algorithm for classification by Al-mazini, Hassan Fouad Abbas

    Published 2022
    “…The classification of this type of dataset requires Feature Selection (FS) methods for the extraction of useful information. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Parameter extraction of single, double, and three diodes photovoltaic model based on guaranteed convergence arithmetic optimization algorithm and modified third order Newton Raphso... by Mohammed Ridha, Hussein, Hizam, Hashim, Mirjalili, Seyedali, Othman, Mohammad Lutfi, Ya'acob, Mohammad Effendy, Ahmadipour, Masoud

    Published 2022
    “…The proposed guaranteed convergence arithmetic optimization algorithm based on efficient modified third order Newton Raphson (GCAOAEmNR) method highlights important contributions to the literature in terms of methodology (explorer-exploiter phases) and objective function design. …”
    Get full text
    Get full text
    Article
  11. 11

    Using algorithmic taxonomy to evaluate lecturer workload by Hashim, Ruhil Hayati, Abdul Hamid, Jamaliah, Selamat, Mohd Hasan, Ibrahim, Hamidah, Abdullah, Rusli, Mohayidin, Mohd Ghazali

    Published 2006
    “…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Online Clothing Shopbots via Web Content Extraction / Nurul Syazwani Ramzi by Ramzi, Nurul Syazwani

    Published 2017
    “…An algorithm vision based page segmentation algorithm will be implemented in this system to extract the data from multiple websites and will be displayed in new website. …”
    Get full text
    Get full text
    Thesis
  13. 13

    APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN by SARI, YUNITA SARI

    Published 2011
    “…The second contribution is the extraction pattern construction. Each named entity candidate will be assigned with an extraction pattern constructed from a set of word and syntactical feature. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Enhanced Hopfield Neural Networks With Artificial Immune System Algorithm For Satisfiability Logic Programming by Mansor, Mohd. Asyraf

    Published 2017
    “…Hence, a robust intelligence system that integrates the Hopfield neural network and metaheuristic paradigm is constructed to extract the data set hidden knowledge in the form of 3-Satisfiability logical rule. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A genetic algorithm based fuzzy inference system for pattern classification and rule extraction by Wong S.Y., Yap K.S., Li X.

    Published 2023
    “…This paper presents a genetic-algorithm-based fuzzy inference system for extracting highly comprehensible fuzzy rules to be implemented in human practices without detailed computation (hereafter denoted as GA-FIS). …”
    Article
  19. 19

    Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal by Abdul Hamid, Jamaliah, Mohayidin, Mohd Ghazali, Selamat, Mohd Hasan, Ibrahim, Hamidah, Abdullah, Rusli, Hashim, Ruhil Hayati

    Published 2006
    “…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Deep learning for EEG data analysis by Cheah, Kit Hwa

    Published 2018
    “…In this project, deep neural network architectures have been constructed to perform binary classification on an EEG dataset that was shown by traditional EEG feature extraction methods to have no significant difference between its two data pools (resting EEG recorded before and recorded after listening to music). …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis