Search Results - (( using extraction method algorithm ) OR ( data replication method algorithm ))

Refine Results
  1. 1

    Enhancing clustering algorithm with initial centroids in tool wear region recognition by Kasim, Nur Adilla, Nuawi, Mohd Zaki, Abdul Ghani, Jaharah, Ngatiman, Nor Azazi, Che Haron, Che Hassan, Muhammad Rizal

    Published 2020
    “…F-Km is found to be more accurate, time savvy and robust than standard K-means and K-means + +. Therefore, the method can be reliably used for observing tool wear state recognition without training and equivocate traditional direct tool wear.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Finger-Vein Biometric Identification Using Convolutional Neural Network by Syafeeza, Ahmad Radzi, Mohamed, Khalil-Hani, Rabia, Bakhteri

    Published 2016
    “…In conventional finger-vein recognition methods, complex image processing is required to remove noise and extract and enhance the features before the image classification can be performed in order to achieve high performance accuracy. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Enhancing secure QR code steganography through artificial intelligence: a conceptual framework by Roslan, Nuur Alifah, Lydia, Maya Silvi, Gutub, Adnan

    Published 2025
    “…This study presents a method for achieving product authentication through data concealing. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Dynamic replication algorithm in data grid: Survey by K. Madi, Mohammed, Hassan, Suhaidi

    Published 2008
    “…For improving the performance of file accesses and to ease the sharing amongst distributed collaboration, such a system needs replication services. Data replication is a common method used to improve the performance of data access in distributed systems. …”
    Get full text
    Get full text
    Get full text
    Book Section
  5. 5

    Enhanced replication strategy with balanced quorum technique and data center selection method in cloud environment by Mohd Ali, Fazlina

    Published 2022
    “…In order to mitigate the issues, ‘cloud data replication’ is commonly implemented for better data performance and promising business continuity. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The motivation of implementation is to make sure the data replication is easy to maintain and cost effective. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Development of a hybrid machine learning model for rockfall source and hazard assessment using laser scanning data and GIS by Fanos, Ali Mutar

    Published 2019
    “…This indicates that the model can be generalized and replicated in different regions and the proposed method can be applied in various landslides studies. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10
  11. 11

    Extracting feature from images by using K-Means clustering algorithm / Abdul Hakim Zainal Abidin by Zainal Abidin, Abdul Hakim

    Published 2016
    “…This research scope are to develop a computer application that can extract meaningful information in images by implement KMeans clustering algorithm 10 self capture facial image will be use as the research subject to test the algorithm that will extracting meaningful information of the person. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A block-based multi-scale background extraction algorithm by Davarpanah, Seyed Hashem, Khalid, Fatimah, Golchin, Maryam

    Published 2010
    “…Conclusion: Using Multi scaling filtering and applying the filters just to some selected nonoverlapped blocks reduce the time consumption of the extracting background algorithm. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    A fingerprint matching algorithm using bit-plane extraction method with phase-only correlation by Florence, Francis-Lothai, Bong, David B L

    Published 2017
    “…Region of interest (ROI) of a fingerprint image is extracted by using a modified blob analysis method, and then the core point of the ROI is detected for dimension reduction process. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Machine Vision Application For Automatic Defect Segmentation In Weld Radiographs by Soo , Say Leong

    Published 2006
    “…The weld extraction algorithm was developed to locate and extract welds automatically from the intensity profiles taken across the image by using graphical analysis. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Social media mining: a genetic based multiobjective clustering approach to topic modelling by Alfred, Rayner, Loo, Yew Jie, Obit, Joe Henry, Lim, Yuto, Haviluddin, Haviluddin, Azman, Azreen

    Published 2021
    “…As the components of big data continue to expand, the task of extracting useful information becomes critical. Topic extraction refers to the process of extracting main topics from the pool of news feed and a typical method to perform topic extraction is through clustering. …”
    Get full text
    Get full text
    Article
  18. 18

    Topic identification using filtering and rule generation algorithm for textual document by Nurul Syafidah, Jamil

    Published 2015
    “…The proposed filtering algorithm (PFA) will extract the most relevant terms from text and solve synonym roblem amongst the extracted terms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier by Siow, Shien Loong

    Published 2018
    “…Classic local binary pattern (LBP) is one of the most useful feature extraction methods. Moreover, K-Nearest Neighbour (K-NN) classifier is one of the widely use classifier due to its simplicity. …”
    Get full text
    Get full text
    Monograph
  20. 20