Search Results - (( using evaluation method algorithm ) OR ( pattern extraction method algorithm ))

Refine Results
  1. 1

    Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier by Siow, Shien Loong

    Published 2018
    “…Classic local binary pattern (LBP) is one of the most useful feature extraction methods. …”
    Get full text
    Get full text
    Monograph
  2. 2

    Integration Of Unsupervised Clustering Algorithm And Supervised Classifier For Pattern Recognition by Leong, Shi Xiang

    Published 2017
    “…However, further study is needed in the feature extraction and clustering algorithms part as the performance of the pattern classification is still depending on the data input.…”
    Get full text
    Get full text
    Thesis
  3. 3

    A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat by Sakamat, Norzehan

    Published 2021
    “…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
    Get full text
    Get full text
    Thesis
  4. 4

    APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN by SARI, YUNITA SARI

    Published 2011
    “…In our research, extraction pattern from the first module will be fed to this algorithm and is used to make the prediction of named entity candidate category. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Computer-aided acute leukemia blast cells segmentation in peripheral blood images by Madhloom, H.T., Kareem, S.A., Ariffin, H.

    Published 2015
    “…The first aim is to segment the leukemic cells by mean of color transformation and mathematical morphology. The method also introduces an approach to split overlapping cells using the marker-controlled watershed algorithm based on a new marker selection scheme. …”
    Get full text
    Article
  6. 6

    Opposition Based Competitive Grey Wolf Optimizer For EMG Feature Selection by Too, Jing Wei, Abdullah, Abdul Rahim

    Published 2020
    “…Four state-of-the-art algorithms include particle swarm optimization, flower pollination algorithm, butterfly optimization algorithm, and CBGWO are used to examine the effectiveness of proposed methods in feature selection. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Offline handwritten character recognition using backpropagation neural network / Masnizah Mohadi by Mohadi, Masnizah

    Published 2005
    “…This project presents a study on the offline handwritten character recognition using backpropagation algorithm that is one of the training algorithms used in Artificial Neural Network. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Comparison Of Ridge Filters Performance in Human Vein Extraction Using 850nm Near Infrared Led Illumination by Abu Bakar Abd Rahman, Abdullah Bade, Fuei, Pien Chee

    Published 2023
    “…This paper investigates the performance of the ridge filters algorithm for vein feature extraction by using the NIR imaging technique to visualise human vein vessels. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  9. 9

    An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA by Bian, Hui

    Published 2025
    “…Using the NSL-KDD dataset for evaluation, the proposed method demonstrates superior performance compared to conventional algorithms and related deep learning techniques, achieving higher precision, recall, F1 scores and overall accuracy in both binary and multi-class classification tasks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Analytical method for forensic investigation of social networking applications on smartphones by Dezfouli, Farhood Norouzizadeh

    Published 2016
    “…Moreover, an algorithm was designed that automatically extracts social networking data remnants from smartphones using the identified patterns. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Image Stitching Of Aerial Footage by Ng, Wei Haen

    Published 2021
    “…The images are warped to the key frame of the footage to generate a stitched image by using the computed homography. The algorithm performance is evaluated using the Orchard datasets, consisting of L-shape flight pattern and lawnmower flight pattern. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    Liver segmentation on CT images using random walkers and fuzzy c-means for treatment planning and monitoring of tumors in liver cancer patients by Moghbel, Mehrdad

    Published 2017
    “…The proposed method is based on a hybrid method integrating random walkers algorithm with integrated priors and particle swarm optimized spatial fuzzy c-means (FCM) algorithm with level set method and AdaBoost classifier. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…After evaluating the results of these algorithms, a hybrid Artificial Neural Network-based Imperial Competitive Algorithm (ANN-ICA) was presented in the deployment step of the proposed methodology to identify the structural damage of illustrative structures. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Feature detector-level fusion methods in food recognition by Razali @ Ghazali, Mohd Norhisham, Manshor, Noridayu

    Published 2019
    “…An automatic dietary pattern assessment via food recognition algorithm provide an alternative way to improve the overall quality of dietary pattern assessment. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan by Diaa , Mohammed Hassan Uliyan

    Published 2016
    “…The method is based on blur metric evaluation (BME) and phase congruency (PCy). …”
    Get full text
    Get full text
    Thesis
  18. 18

    Towards a Malay derivational lexicon: learning affixes using expectation maximization by Sulaiman, Suriani, Gasser, Michael, Kubler, Sandra

    Published 2011
    “…We train the model with EM to find the segmentation that maximizes the probability of each morpheme. We extract the set of affix patterns produced by our algorithm and evaluate them against two references: a list of affix patterns extracted from our hand-segmented derivational wordlist and a derivational history produced by a stemmer.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19
  20. 20

    Photogrammetric low-cost unmanned aerial vehicle for pothole detection mapping / Shahrul Nizan Abd Mukti by Abd Mukti, Shahrul Nizan

    Published 2022
    “…These results confirmed that the UAV is a very useful form of technology in road maintenance applications, at the same time, contributing in alternative method of pothole information extraction. …”
    Get full text
    Get full text
    Thesis