Search Results - (( features extraction window algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1
  2. 2

    Non-fiducial based electrocardiogram biometrics with kernel methods by Hejazi, Maryamsadat

    Published 2017
    “…The effectiveness of this algorithm is investigated by comparing with other AC based feature extraction algorithms involving AC/LDA (Linear Discriminant Analysis) and AC/PCA (Principal Component Analysis). …”
    Get full text
    Get full text
    Thesis
  3. 3

    Design of intelligent Qira’at identification algorithm by Kamarudin, Noraziahtulhidayu

    Published 2017
    “…For the feature vectors that are collected from feature extraction (MFCC) and feature selection (X-ACO), the feature vectors are used as input for the classification phase. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Towards lowering computational power in IoT systems: Clustering algorithm for high-dimensional data stream using entropy window reduction by Alkawsi G., Al-amri R., Baashar Y., Ghorashi S., Alabdulkreem E., Kiong Tiong S.

    Published 2024
    “…This paper introduces an Entropy Window Reduction (EWR) algorithm, which is an improved version of the BOCEDS technique. …”
    Article
  6. 6

    Identification of Flower Species with Natural Markers by Tan, Mei Synn

    Published 2019
    “…Algorithms of investigation span from extraction, matching and identification to determine the image features. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…The results show that the extraction algorithm has been able to extract 100 % of the information correctly. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Blood vessel segmentation in color fundus images based on regional and Hessian features by Shah, S.A.A., Tang, T.B., Faye, I., Laude, A.

    Published 2017
    “…To rectify the variation in contrast, we used a 5 × 5 window filter on each pixel. Based on 5 regional features, 1 intensity feature and 2 Hessian features per scale using 9 scales, we extracted a total of 24 features. …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  11. 11
  12. 12
  13. 13
  14. 14

    Studies on the application of wavelet families for a high impedance fault location algorithm in a distribution network by Ali, M.S., Bakar, Ab Halim Abu, Tan, Chia Kwang, Mokhlis, Hazlie, Arof, Hamzah

    Published 2016
    “…However, in this paper, the performance of the previous algorithm is investigated first in terms of different sampling rate and window size. …”
    Get full text
    Get full text
    Article
  15. 15

    Adaptive multi-parent crossover GA for feature optimization in epileptic seizure identification by Al-Sharhan, Salah, Bimba, Andrew

    Published 2019
    “…This process of selecting an optimal feature subset is an optimization problem. Thus, we propose an adaptive multi-parent crossover Genetic Algorithm (GA) for optimizing the features used in classifying epileptic seizures. …”
    Get full text
    Get full text
    Article
  16. 16

    EEG-based biometric authentication modelling using incremental fuzzy-rough nearest neighbour technique by Liew, Siaw Hong, Choo, Yun Huoy, Low, Yin Fen, Zeratul I., Mohd Yusoh

    Published 2018
    “…This paper proposes an Incremental Fuzzy-Rough Nearest Neighbour (IncFRNN) technique for biometricauthentication modelling using feature extracted visual evoked. Only small training set is needed for model initialisation. …”
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Proactive Traffic-Adaptive Tuning of Contention Window for Wireless Sensor Network Medium-Access Control Protocol by Pirborj, Nesae Mouzehkesh

    Published 2009
    “…We have tried to come up with a dynamic back-off algorithm for SMAC that can extract the current traffic information of the network and engage them in estimating the contention window from which the back-off time is chosen. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Comparison of supervised machine learning algorithms for malware detection / Mohd Faris Mohd Fuzi ... [et al.] by Mohd Fuzi, Mohd Faris, Mohd Shahirudin, Syamir, Abd Halim, Iman Hazwam, Jamaluddin, Muhammad Nabil Fikri

    Published 2023
    “…This study was solely concerned with the Windows malware dataset. The malware classification was determined by testing and training the supervised ML algorithms using the extracted features from the malware dataset. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique by Liew, Siaw Hong

    Published 2016
    “…The electrodes, feature extraction, and feature selection analysis were tested using the benchmarking dataset from UCI repositories. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis