Search Results - (( peer evaluation method algorithm ) OR ( pattern extraction method algorithm ))

Refine Results
  1. 1

    Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier by Siow, Shien Loong

    Published 2018
    “…Classic local binary pattern (LBP) is one of the most useful feature extraction methods. …”
    Get full text
    Get full text
    Monograph
  2. 2

    Integration Of Unsupervised Clustering Algorithm And Supervised Classifier For Pattern Recognition by Leong, Shi Xiang

    Published 2017
    “…However, further study is needed in the feature extraction and clustering algorithms part as the performance of the pattern classification is still depending on the data input.…”
    Get full text
    Get full text
    Thesis
  3. 3

    A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat by Sakamat, Norzehan

    Published 2021
    “…Readability was detected using a free online optical character recognition application called Aeosoft. Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
    Get full text
    Get full text
    Thesis
  4. 4

    APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN by SARI, YUNITA SARI

    Published 2011
    “…In our research, extraction pattern from the first module will be fed to this algorithm and is used to make the prediction of named entity candidate category. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Computer-aided acute leukemia blast cells segmentation in peripheral blood images by Madhloom, H.T., Kareem, S.A., Ariffin, H.

    Published 2015
    “…This paper presents a new image segmentation method to extract acute leukemia blast cells in peripheral blood. …”
    Get full text
    Article
  6. 6

    An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA by Bian, Hui

    Published 2025
    “…However, these algorithms often fall short in consistently detecting and classifying network intrusions, particularly when distinctions between classes are subtle or when facing evolving attack patterns. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Opposition Based Competitive Grey Wolf Optimizer For EMG Feature Selection by Too, Jing Wei, Abdullah, Abdul Rahim

    Published 2020
    “…Four state-of-the-art algorithms include particle swarm optimization, flower pollination algorithm, butterfly optimization algorithm, and CBGWO are used to examine the effectiveness of proposed methods in feature selection. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Handwritten digits recognition based on improved label propagation algorith by Jie, M., Aziz, I.A., Hasbullah, H., Azizan, S.A.B.

    Published 2016
    “…In this research work, a new method based on label propagation algorithm for handwritten digits recognition is presented. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    Feature detector-level fusion methods in food recognition by Razali @ Ghazali, Mohd Norhisham, Manshor, Noridayu

    Published 2019
    “…An automatic dietary pattern assessment via food recognition algorithm provide an alternative way to improve the overall quality of dietary pattern assessment. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Analytical method for forensic investigation of social networking applications on smartphones by Dezfouli, Farhood Norouzizadeh

    Published 2016
    “…Moreover, an algorithm was designed that automatically extracts social networking data remnants from smartphones using the identified patterns. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Identifying melanoma characteristics using directional imaging algorithm and convolutional neural network on dermoscopic images / Mohammad Asaduzzaman Rasel by Mohammad Asaduzzaman , Rasel

    Published 2024
    “…Several imaging, computer vision, and pattern recognition algorithms are employed to describe five dermoscopic features. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Image Stitching Of Aerial Footage by Ng, Wei Haen

    Published 2021
    “…The implemented method successfully stitched the frames extracted from the aerial footage to generate a large scene image beyond the normal resolution.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan by Diaa , Mohammed Hassan Uliyan

    Published 2016
    “…The average detection rate of our algorithm maintained 96 % true positive rate and 7 % false positive rate which outperform several current detection methods. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Liver segmentation on CT images using random walkers and fuzzy c-means for treatment planning and monitoring of tumors in liver cancer patients by Moghbel, Mehrdad

    Published 2017
    “…Based on the location of the lung, the liver dome is automatically detected and the liver is then extracted by random walkers method and refined using a fuzzy level set method. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Towards a Malay derivational lexicon: learning affixes using expectation maximization by Sulaiman, Suriani, Gasser, Michael, Kubler, Sandra

    Published 2011
    “…We train the model with EM to find the segmentation that maximizes the probability of each morpheme. We extract the set of affix patterns produced by our algorithm and evaluate them against two references: a list of affix patterns extracted from our hand-segmented derivational wordlist and a derivational history produced by a stemmer.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…One of the approaches for structural health monitoring (SHM) consists of two major components, i.e. a network of sensors to collect the response data and an extraction method to obtain information on the structural health condition. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Photogrammetric low-cost unmanned aerial vehicle for pothole detection mapping / Shahrul Nizan Abd Mukti by Abd Mukti, Shahrul Nizan

    Published 2022
    “…These results confirmed that the UAV is a very useful form of technology in road maintenance applications, at the same time, contributing in alternative method of pothole information extraction. The information gathered is useful for Authorities, concession expressway company and interest party for better road maintenance implementation.…”
    Get full text
    Get full text
    Thesis
  20. 20

    The classification of motor imagery response: an accuracy enhancement through the ensemble of random subspace k-NN by Rashid, Mamunur, Bari, Bifta Sama, Hasan, Md Jahid, Mohd Azraai, Mohd Razman, Rabiu Muazu, Musa, Ahmad Fakhri, Ab. Nasir, Anwar, P. P. Abdul Majeed

    Published 2021
    “…The common spatial pattern (CSP) has been applied to extract the features from the MI response, and the effectiveness of random forest (RF)-based feature selection algorithm has also been investigated. …”
    Get full text
    Get full text
    Get full text
    Article