Search Results - (( parallel estimation path algorithm ) OR ( variable extractions research algorithm ))

Refine Results
  1. 1

    Magnetic resonance imaging sense reconstruction system using FPGA / Muhammad Faisal Siddiqui by Muhammad Faisal , Siddiqui

    Published 2016
    “…Furthermore, variable databus widths are used in the data path of the proposed architecture, which leads to reducing the hardware cost and silicon area. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Development Of Fall Risk Clustering Algorithm In Older People by Wong, Kam Kang

    Published 2020
    “…This study employed Malaysian Elders Longitudinal Research (MELoR) dataset. A total of 1279 subjects and 9 variables from dataset (1411 subjects and 139 variables) are selected for clustering. t-Distributed Stochastic Neighbour Embedding (t-SNE) for feature extraction and K-means clustering algorithm achieved the highest performance in clustering, which grouping the subjects into Low (13%), Intermediate A (19%), Intermediate B (21%) and High (31%) fall risk group. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad by Ahmad, Khairul Adilah

    Published 2018
    “…This reserarch adapted a methodology of computer vision and algorithms that exploit image segmentation, feature extraction and fuzzy classification to guide the research activities. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Optimized clustering with modified K-means algorithm by Alibuhtto, Mohamed Cassim

    Published 2021
    “…In dealing with correlated variables, PCA was embedded in the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Development of an effective clustering algorithm for older fallers by Goh, Choon Hian, Wong, Kam Kang, Tan, Maw Pin *, Ng, Siew Cheok, Chuah, Yea Dat, Kwan, Ban Hoe

    Published 2022
    “…The purpose of this study was, therefore, to develop a clustering-based algorithm to determine falls risk. Data from the Malaysian Elders Longitudinal Research (MELoR), comprising 1411 subjects aged ≥55 years, were utilized. …”
    Get full text
    Get full text
    Article
  7. 7

    Analyzing The Potential Of Genetic Algorithm For Maximum Power Point Tracking In Wind Energy Conversion System In Malaysia by Nasrullah Bin Isnin

    Published 2023
    “…With the increase of popularity, there are many researches is done in order to extract the maximum power from the wind energy. …”
  8. 8

    Chain coding and pre processing stages of handwritten character image file by Suliman, Azizah, Sulaiman, Md. Nasir, Othman, Mohamed, O. K. Rahmat, Rahmita Wirza

    Published 2010
    “…In this paper detailed descriptions of the algorithms used in the pre-processing and feature extraction phases of an offline handwritten character are discussed. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Classification Of Cervical Cancer Stage From Pap Smear Tests by Sendal, Ken Irok

    Published 2019
    “…Feature extraction is then used to select the appropriate features that contribute most to the predicted variable from the image. …”
    Get full text
    Get full text
    Final Year Project
  10. 10
  11. 11

    Fast adaptive motion estimation search algorithm for H.264 encoder by Patwary, Md Anwarul Kaium

    Published 2012
    “…Simulation result shows that as compared to previous research, this algorithm achieves up to average 60% reduction in motion estimation time without degrading the video quality.…”
    Get full text
    Get full text
    Thesis
  12. 12

    Design of intelligent Qira’at identification algorithm by Kamarudin, Noraziahtulhidayu

    Published 2017
    “…It proves that the current proposed algorithm achieves better results in Echo Greathall comparable to Echo Lecture Room and finally, these results will be used as foundation for any upcoming related research that may improve the understanding of Qira’at among the Muslim.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Rough Neural Networks Architecture For Improving Generalization In Pattern Recognition by Ali Adlan, Hanan Hassan

    Published 2004
    “…The RNN was used to detect patterns present in satellite image. A novel feature extraction algorithm was developed to extract the feature vectors. …”
    Get full text
    Get full text
    Thesis
  14. 14

    CAT CHAOTIC GENETIC ALGORITHM BASED TECHNIQUE AND HARDWARE PROTOTYPE FOR SHORT TERM ELECTRICAL LOAD FORECASTING by ISLAM, BADAR UL ISLAM

    Published 2017
    “…In this research work, a modified backpropagation neural network is combined with a modified chaos-search genetic algorithm for STLF of one day and a week ahead. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Analysis of Traffic Accident Patterns Using Association Rule Mining by Yudy, Pranata, Tri Basuki, Kurniawan, Edi Surya, Negara, Ahmad Haidar, Mirza

    Published 2024
    “…This study also demonstrated the practicality of the apriori algorithm in analyzing extensive datasets to extract actionable insights. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Short-term electricity price forecasting in deregulated electricity market based on enhanced artificial intelligence techniques / Alireza Pourdaryaei by Alireza , Pourdaryaei

    Published 2020
    “…A multi-objective feature technique is developed in this study to extract the most influential subsets of input variables with the maximum relevancy and minimum redundancy. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Online handwritten signature recognition by length normalization using up-sampling and down-sampling by Malallah, Fahad Layth, Syed Ahmad, Sharifah Mumtazah, Wan Adnan, Wan Azizun, Arigbabu, Olasimbo Ayodeji, Iranmanesh, Vahab, Yussof, Salman

    Published 2015
    “…This difference in the produced signature is referred to as intra-user variability. Verification difficulty occurs especially in the case where the feature extraction and classification algorithms are designed to classify a stable length vector of input features. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20