Search Results - (( pattern extraction method algorithm ) OR ( using evaluation method algorithm ))
Search alternatives:
- pattern extraction »
- extraction method »
- evaluation method »
- method algorithm »
- using evaluation »
-
1
Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier
Published 2018“…Classic local binary pattern (LBP) is one of the most useful feature extraction methods. …”
Get full text
Get full text
Monograph -
2
Integration Of Unsupervised Clustering Algorithm And Supervised Classifier For Pattern Recognition
Published 2017“…However, further study is needed in the feature extraction and clustering algorithms part as the performance of the pattern classification is still depending on the data input.…”
Get full text
Get full text
Thesis -
3
A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat
Published 2021“…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
Get full text
Get full text
Thesis -
4
APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN
Published 2011“…In our research, extraction pattern from the first module will be fed to this algorithm and is used to make the prediction of named entity candidate category. …”
Get full text
Get full text
Thesis -
5
Computer-aided acute leukemia blast cells segmentation in peripheral blood images
Published 2015“…The first aim is to segment the leukemic cells by mean of color transformation and mathematical morphology. The method also introduces an approach to split overlapping cells using the marker-controlled watershed algorithm based on a new marker selection scheme. …”
Get full text
Article -
6
Opposition Based Competitive Grey Wolf Optimizer For EMG Feature Selection
Published 2020“…Four state-of-the-art algorithms include particle swarm optimization, flower pollination algorithm, butterfly optimization algorithm, and CBGWO are used to examine the effectiveness of proposed methods in feature selection. …”
Get full text
Get full text
Get full text
Article -
7
Offline handwritten character recognition using backpropagation neural network / Masnizah Mohadi
Published 2005“…This project presents a study on the offline handwritten character recognition using backpropagation algorithm that is one of the training algorithms used in Artificial Neural Network. …”
Get full text
Get full text
Thesis -
8
Comparison Of Ridge Filters Performance in Human Vein Extraction Using 850nm Near Infrared Led Illumination
Published 2023“…This paper investigates the performance of the ridge filters algorithm for vein feature extraction by using the NIR imaging technique to visualise human vein vessels. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
9
An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA
Published 2025“…Using the NSL-KDD dataset for evaluation, the proposed method demonstrates superior performance compared to conventional algorithms and related deep learning techniques, achieving higher precision, recall, F1 scores and overall accuracy in both binary and multi-class classification tasks. …”
Get full text
Get full text
Get full text
Thesis -
10
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
11
Analytical method for forensic investigation of social networking applications on smartphones
Published 2016“…Moreover, an algorithm was designed that automatically extracts social networking data remnants from smartphones using the identified patterns. …”
Get full text
Get full text
Get full text
Thesis -
12
Identifying melanoma characteristics using directional imaging algorithm and convolutional neural network on dermoscopic images / Mohammad Asaduzzaman Rasel
Published 2024“…Both phases of the research outputs are evaluated and compared with the state-of-the-art methods. …”
Get full text
Get full text
Get full text
Thesis -
13
Image Stitching Of Aerial Footage
Published 2021“…The images are warped to the key frame of the footage to generate a stitched image by using the computed homography. The algorithm performance is evaluated using the Orchard datasets, consisting of L-shape flight pattern and lawnmower flight pattern. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Liver segmentation on CT images using random walkers and fuzzy c-means for treatment planning and monitoring of tumors in liver cancer patients
Published 2017“…The proposed method is based on a hybrid method integrating random walkers algorithm with integrated priors and particle swarm optimized spatial fuzzy c-means (FCM) algorithm with level set method and AdaBoost classifier. …”
Get full text
Get full text
Get full text
Thesis -
15
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…After evaluating the results of these algorithms, a hybrid Artificial Neural Network-based Imperial Competitive Algorithm (ANN-ICA) was presented in the deployment step of the proposed methodology to identify the structural damage of illustrative structures. …”
Get full text
Get full text
Get full text
Thesis -
16
Feature detector-level fusion methods in food recognition
Published 2019“…An automatic dietary pattern assessment via food recognition algorithm provide an alternative way to improve the overall quality of dietary pattern assessment. …”
Get full text
Get full text
Conference or Workshop Item -
17
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
Published 2016“…The method is based on blur metric evaluation (BME) and phase congruency (PCy). …”
Get full text
Get full text
Thesis -
18
Towards a Malay derivational lexicon: learning affixes using expectation maximization
Published 2011“…We train the model with EM to find the segmentation that maximizes the probability of each morpheme. We extract the set of affix patterns produced by our algorithm and evaluate them against two references: a list of affix patterns extracted from our hand-segmented derivational wordlist and a derivational history produced by a stemmer.…”
Get full text
Get full text
Get full text
Proceeding Paper -
19
-
20
Photogrammetric low-cost unmanned aerial vehicle for pothole detection mapping / Shahrul Nizan Abd Mukti
Published 2022“…These results confirmed that the UAV is a very useful form of technology in road maintenance applications, at the same time, contributing in alternative method of pothole information extraction. …”
Get full text
Get full text
Thesis
