Search Results - (( using function based algorithm ) OR ( using extraction process algorithm ))
Search alternatives:
- process algorithm »
- using extraction »
- using function »
-
1
An intelligent data mapping for hydrological information system (his) cube data base to cater from various data types
Published 2004“…Using sequential recognition algorithm can also further reduce the time required for extraction of information. …”
Get full text
Get full text
Monograph -
2
Pengekstrakan data berasaskan pendekatan ontologi: kes data jujukan hidrologi
Published 2005“…Using sequential recognition algorithm can also further reduce the time required for extraction of information. …”
Get full text
Get full text
Thesis -
3
Pashto language stemming algorithm
Published 2015“…Furthermore, the accuracy and strength of the proposed algorithm is evaluated using word count method. To validate the function of the developed algorithm, two native speakers of Pashto were recruited to evaluate the algorithm in terms of its accuracy and strength. …”
Get full text
Get full text
Get full text
Article -
4
Features extraction based on fuzzy clustering and segmentation onto the motion region for medium field surveillance application
Published 2004“…Instead of using blob analysis, we believe that fuzzy based clustering algorithm, can also be used to generate different clusters. …”
Get full text
Get full text
Get full text
Book Section -
5
A fingerprint matching algorithm using bit-plane extraction method with phase-only correlation
Published 2017“…Region of interest (ROI) of a fingerprint image is extracted by using a modified blob analysis method, and then the core point of the ROI is detected for dimension reduction process. …”
Get full text
Get full text
Get full text
Article -
6
Identifying Students' Summary Writing Strategies Using Summary Sentence Decomposition Algorithm
Published 2011“…We first analyzed experts' written summaries, extracted the strategies used in the summaries, formulated a set of heuristics rules to define the strategies and finally transformed the rules using position-based method into summary sentence decomposition algorithm (SSDA). …”
Get full text
Get full text
Get full text
Article -
7
Jogging activity recognition using k-NN algorithm
Published 2022“…The k-NN algorithm is a simple and easy-to-implement supervised machine learning algorithm that can be used to solve both classification and regression problems. …”
Get full text
Get full text
Get full text
Academic Exercise -
8
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…Therefore, this research has designed fuzzy learning algorithm that is able to classify fruits based on their shape and size features using Harumanis dataset. …”
Get full text
Get full text
Thesis -
9
Using genetic algorithms as image watermarking performance optimizer / Zuhaili Zahid
Published 2008“…As a result, these errors will produce less accurate results during the process of extraction to the original watermark. Thus, this project will introduce a genetic-algorithms-based technique to overcome the rounding error problem. …”
Get full text
Get full text
Thesis -
10
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…The raster graphics are decomposed using various kind of wavelets together with numerous type of methods in this research to examine the process and the output coefficients of wavelet transform. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Diagnosis and treatment recommender system for myocardial infarction using decision tree and Support Vector Machines (SVM) / Wan Marzuqiamrin Wan Mansor
Published 2025“…The prototype functions by initially allowing the user to upload an ECG image which will be processed using SVM for feature extraction and classification. …”
Get full text
Get full text
Thesis -
12
-
13
Hybrid subjective evaluation of rule Exraction Algorithm using Weighted Subsethood-Based (WSBA)
Published 2013“…Fuzzy rules are important elements that being highlighted in any fuzzy expert system.This research proposes the framework of subjective performance evaluation using fuzzy technique for ranking the performance of the financial performance of a company under a multi criteria environment.There are a lot of techniques used such as fuzzy similarity function, fuzzy synthetic decision and satisfaction function have been adopted.The framework is based on fuzzy multi-criteria decision-making that consists of fuzzy rules.The use of fuzzy rules, which were extracted directly from input data through Weighted Subsethood-based (WSBA) Rule Generation Algorithm.WSBA rule generation use the subsethood values to generate the weights which finally produced the fuzzy general rules.The rules generated through the data provided knowledge in developed fuzzy rule The fuzzy rules embedded in the framework of subjective evaluation method showed advantages in generalizing the evaluation of the performance achievement, where the evaluation process can be conducted consistently in producing good evaluation results with the use of the membership set score.The results from the numerical examples are comparable to other fuzzy evaluation methods, even with the use of small rule size.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Hybrid subjective evaluation method using weighted subsethood - based (WSBA) rule generation algorithm
Published 2013“…The use of fuzzy rules, which were extracted directly from input data through Weighted Subsethood-based (WSBA) Rule Generation Algorithm.WSBA rule generation use the subsethood values to generate the weights which finally produced the fuzzy general rules.The rules generated through the data provided knowledge in developed fuzzy rule The fuzzy rules embedded in the framework of subjective evaluation method showed advantages in generalizing the evaluation of the performance achievement, where the evaluation process can be conducted consistently in producing good evaluation results with the use of the membership set score.The results from the numerical examples are comparable to other fuzzy evaluation methods, even with the use of small rule size.…”
Get full text
Get full text
Get full text
Article -
15
Moment-based extraction on handwritten digits
Published 2005“…Classification and recognition results are analyzed to determine the necessity of operation thinning when dealing with the moment functions. A Simple Block Segmentation with Moore Tracing Algorithm (SBS & MNTA) is used in image segmentation while Safe-point Thinning Algorithm (SPTA) is applied in image thinning process. …”
Get full text
Get full text
Monograph -
16
A shift column different offset for better Rijndael security
Published 2009“…The security of the algorithm on the other hand, is based on the randomness of the output from the encryption process. …”
Get full text
Get full text
Get full text
Article -
17
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…To evaluate the algorithm, we conducted two experiments. In the first experiment, we examine the functionality of the system, whether the system is able to identify the summarizing strategies used by students in summary writing. …”
Get full text
Get full text
Thesis -
18
Mel Frequency Cepstral Coefficient (MFCC) extraction for speaker identification on FPGA
Published 2009Get full text
Working Paper -
19
A study on component-based technology for development of complex bioinformatics software
Published 2004“…The second layer uses discriminative SVM algorithm with a state-of-the-art string kernel based on PSI-BLAST profiles that is used to leverage the unlabeled data. …”
Get full text
Get full text
Monograph -
20
Development of efficient iris identification algorithm using wavelet packets for smartphone application
Published 2017“…Nowadays, iris recognition is widely used for personal identification and verification based on biometrical technology, especially in the smartphone arena. …”
Get full text
Get full text
Get full text
Get full text
Article
