Search Results - (( developing coding based algorithm ) OR ( data extraction method algorithm ))
Search alternatives:
- developing coding »
- extraction method »
- method algorithm »
- coding based »
-
1
Crow Search Freeman Chain Code (CS-FCC) feature extraction algorithm for handwritten character recognition
Published 2023“…In this research, a Crow Search Algorithm (CSA)-based metaheuristic strategy for feature extraction in HCR was developed. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Aplikasi rangkaian neural dalam pengesanan simpang bagi penterjemah lakaran pintar
Published 2006“…The neural network package in Matlab software was used by this artificial intelligent method to develop a neural network classifier. Back propagation neural network algorithm was used to develop and produce the classifier for corner detector algorithm. …”
Get full text
Get full text
Thesis -
3
Agent-based extraction algorithm for computational problem solving
Published 2015“…The results show that the extraction algorithm has been able to extract 100 % of the information correctly. …”
Get full text
Get full text
Thesis -
4
Image clustering comparison of two color segmentation techniques
Published 2010“…There are many algorithm for analysing clustering each having its own method to do clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Abnormal data detection model based on autoencoder and random forest algorithm: camera sensor data in autonomous driving systems
Published 2025“…The proposed method will use convolutional autoencoders to calculate the reconstruction error and combine the hidden features extracted by the encoder as the input of the random forest to distinguish normal data from abnormal data. …”
Get full text
Get full text
Get full text
Article -
6
-
7
A COMPARISON STUDY OF DATA CLUSTERING AND VISUALISATION TECHNIQUES WITH VARIOUS DATA TYPES
Published 2020“…There are many types of clustering techniques that have been developed included partitioning methods, hierarchical clustering, density-based clustering, model-based clustering, and fuzzy clustering. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
8
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
Get full text
Get full text
Get full text
Article -
9
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
10
Leveraging mechanomyography signal for quantitative muscle spasticity assessment of upper limb in neurological disorders using machine learning
Published 2024“…Thirty subjects who satisfied the requirements and provided consent were recruited to participate in the data collection. The data underwent a pre-processing stage and was subsequently analysed prior to the extraction of features. …”
Get full text
Get full text
Get full text
Article -
11
POWER QUALITY CLASSIFICATION WITH DE-NOISING SCHEME USING WAVELET TRANSFORM AND RULE- BASED METHOD
Published 2012“…Unique features from the I", 4t h ,7th and 8thl evel details are obtained as criteria for developing a Rules-Based Algorithm for classifying disturbances that have occurred. …”
Get full text
Get full text
Thesis -
12
Algorithm analyzer to check the efficiency of codes
Published 2011“…This paper described how software metrics can be used in analyzing efficiency of the developed code in early stage of development. A tool (algorithm analyzer) was developed to enable analyze a given code to check its efficiency level and produce efficiency reports based on the analysis. …”
Get full text
Get full text
Conference or Workshop Item -
13
Operational structural damage identification using de-noised modal feature in machine learning / Chen Shilei
Published 2021“…The unsupervised learning method was developed by combining principal component analysis (PCA), waveform chain code (WCC) analysis and hierarchical cluster analysis. …”
Get full text
Get full text
Get full text
Thesis -
14
Development of an Isolated Digit Speech Recognition Based on Multilayer Perceptron Model
Published 2004“…The same approach is utilized in learning and recognition phase for female data sets. The Linear Predictive Coding (LPC) is implemented as a feature extraction method to represent the speech data. …”
Get full text
Get full text
Thesis -
15
-
16
Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication
Published 2021“…The initial investigation on the existing LDPC code decoding algorithms assists to develop a low complexity LDPC code decoding algorithm. …”
Get full text
Get full text
Get full text
Thesis -
17
Detection of head position using chain code algorithm
Published 2007“…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
Get full text
Get full text
Thesis -
18
Detection of head position using chain code algorithm
Published 2007“…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
Get full text
Get full text
Thesis -
19
-
20
Development of high quality speech compression system for Quranic recitation based on modified CELP algorithm
Published 2013“…Next, we optimize CELP algorithm based on previous findings by modifying the original stochastic codebook. …”
Get full text
Get full text
Get full text
Proceeding Paper
