Search Results - (( subject identification method algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- subject identification »
- optimisation algorithm »
- identification method »
- method algorithm »
- java application »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Data mining in mobile ECG based biometric identification
Published 2014“…Experimentation results showed that our method simplifies biometric identification process by obtaining reduced computational complexity when compared to other related algorithms. …”
Get full text
Get full text
Get full text
Article -
3
Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier
Published 2018“…There are seven combinations of the subjects are classified by using the one versus many method. …”
Get full text
Get full text
Monograph -
4
A subject identification method based on term frequency technique
Published 2017“…In this paper, a subject identification method which is based on term frequency to categorize groups of text into a particular subject is proposed. …”
Get full text
Get full text
Get full text
Article -
5
Finger-Vein Biometric Identification Using Convolutional Neural Network
Published 2016“…An additional number of subjects have also been tested, in which for 81 subjects an accuracy of 99.38% is achieved.…”
Get full text
Get full text
Get full text
Article -
6
Automated system for concrete damage classification identification using various classification techniques in machine learning / Nur Haziqah Mat ... [et al.]
Published 2021“…Currently, manual inspection performed by a qualified inspector is the primary inspection method to determine the concrete damage. The manual inspection is a process that is subjective and scarcely effective since it depends heavily on the personal experience and expertise of the inspector to interpret the damage classification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Face identification and verification using PCA and LDA
Published 2008“…In this paper, we describe both of these statistical subspace methods and evaluated them using The Database of Faces which comprises 40 subjects with 10 images each. …”
Get full text
Get full text
Conference or Workshop Item -
8
Thermal Imaging Analysis of Potentially Harmful Subject for Night Vision System
Published 2013“…The feature of subject detected is analysed to improve the identification of the existence of the potentially harmful subject. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
10
-
11
Classification of labour pain using electroencephalogram signal based on wavelet method / Sai Chong Yeh
Published 2020“…The training and parameters selection of the machine learning algorithms are conducted using EEG data collected from ten subjects in the laboratory. …”
Get full text
Get full text
Get full text
Thesis -
12
-
13
CORROSION DAMAGE ANALYSIS USING IMAGE PROCESSING
Published 2018“…This method is very tedious and subjective due to different level of expertise and experience. …”
Get full text
Get full text
Final Year Project -
14
Modelling of Flexible Manipulator System Using Flower Pollination Algorithm
Published 2020“…Then, this input-output data was fed to system identification method to obtain a dynamic model of flexible manipulator system utilizing evolutionary algorithm with linear auto regressive with exogenous (ARX) model structure. …”
Get full text
Get full text
Get full text
Proceeding -
15
Signal quality measures for pulse oximetry through waveform morphology analysis
Published 2011“…The performance of the proposed algorithm is compared to a manually annotated gold standard. …”
Get full text
Get full text
Get full text
Article -
16
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…Therefore, the obtained results through the proposed DM procedure using ANN-ICA (1) confirmed the robustness of the hybrid network in compare to the pre-developed network, and (2) indicated that, the proposed damage identification model can be considered as a precise approach for monitoring the structural condition subjected to vibrational loads. …”
Get full text
Get full text
Get full text
Thesis -
17
-
18
Damage visualization based on frequency shift of single-mode ultrasound-guided wavefield
Published 2022“…Then, generation of frequency map based on ultrasound spectral imaging (USI) for damage identification is investigated. Last but not least, the comparison of accuracy between frequency analysis algorithm and variable time window amplitude mapping (VTWAM) algorithm is performed. …”
Get full text
Get full text
Article -
19
Automatic identification of epileptic seizures from EEG signals using sparse representation-based classification
Published 2020“…Compared to state-of-the-art algorithms and other common methods, our method outperformed them in terms of sensitivity, specificity, and accuracy. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
20
The comparative study of model-based and appearance based gait recognition for leave bag behind
Published 2018“…This is important because the method used capable of identifying the subject based on their gait and can be presented as the most probable subject as a strong evidence for criminal identification. …”
Get full text
Get full text
Get full text
Thesis
