Search Results - (( using function method algorithm ) OR ( _ extraction method algorithm ))
Search alternatives:
- extraction method »
- method algorithm »
- function method »
- using function »
-
1
A fingerprint matching algorithm using bit-plane extraction method with phase-only correlation
Published 2017“…This paper introduces a new method in fingerprint feature extraction based on bit-plane. …”
Get full text
Get full text
Get full text
Article -
2
Utilizing artificial bee colony algorithm as feature selection method in Arabic text classification
Published 2023“…In this paper, the filter method chi square and the Artificial Bee Colony) ABC algorithm were both used as FS methods . …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Cuckoo search algorithm and wind driven optimization based study of satellite image segmentation for multilevel thresholding using Kapur’s entropy
Published 2014“…This algorithm is used to obtain the best solution or best fitness value from the initial random threshold values, and to evaluate the quality of a solution, correlation function is used. …”
Get full text
Get full text
Article -
4
-
5
Pashto language stemming algorithm
Published 2015“…Furthermore, the accuracy and strength of the proposed algorithm is evaluated using word count method. To validate the function of the developed algorithm, two native speakers of Pashto were recruited to evaluate the algorithm in terms of its accuracy and strength. …”
Get full text
Get full text
Get full text
Article -
6
Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms
Published 2020“…In the sizing of the SAPV system, the mutation adaptive DE (MADE) algorithm based multi-objective functions minimizes three constraint objective functions. …”
Get full text
Get full text
Thesis -
7
-
8
Using genetic algorithms as image watermarking performance optimizer / Zuhaili Zahid
Published 2008“…The process of embedding and retracting the data cause the original embedded data to be distorted as a side effect of the current method used. Due to the frequently use of rounding approach, embedded data or watermark hidden in an image is retrieved differently from the original watermark (Shih et al, 2004). …”
Get full text
Get full text
Thesis -
9
Jogging activity recognition using k-NN algorithm
Published 2022“…To recognize and classify the level of jogging intensity, k-Nearest Neighbours (k-NN) algorithms will be considered as a machine learning method. …”
Get full text
Get full text
Get full text
Academic Exercise -
10
An improvement of back propagation algorithm using halley third order optimisation method for classification problems
Published 2020“…This algorithm utilises first order optimisation method namely Gradient Descent (GD) method which attempts to minimise the error of network. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Hybrid subjective evaluation method using weighted subsethood - based (WSBA) rule generation algorithm
Published 2013“…The use of fuzzy rules, which were extracted directly from input data through Weighted Subsethood-based (WSBA) Rule Generation Algorithm.WSBA rule generation use the subsethood values to generate the weights which finally produced the fuzzy general rules.The rules generated through the data provided knowledge in developed fuzzy rule The fuzzy rules embedded in the framework of subjective evaluation method showed advantages in generalizing the evaluation of the performance achievement, where the evaluation process can be conducted consistently in producing good evaluation results with the use of the membership set score.The results from the numerical examples are comparable to other fuzzy evaluation methods, even with the use of small rule size.…”
Get full text
Get full text
Get full text
Article -
12
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…The method employs Semantic Tags Extraction (STSE) algorithm to extract semantic tags of an element and Element Enrichment (EERM) algorithm to enrich the elements. …”
Get full text
Get full text
Get full text
Thesis -
13
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…To evaluate the algorithm, we conducted two experiments. In the first experiment, we examine the functionality of the system, whether the system is able to identify the summarizing strategies used by students in summary writing. …”
Get full text
Get full text
Thesis -
14
Logic Programming In Radial Basis Function Neural Networks
Published 2013“…I used different types of optimization algorithms to improve the performance of the neural networks. …”
Get full text
Get full text
Thesis -
15
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…The raster graphics are decomposed using various kind of wavelets together with numerous type of methods in this research to examine the process and the output coefficients of wavelet transform. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Classification of Mammogram Images Using Radial Basis Function Neural Network
Published 2020“…This method is focused on features extracted from the breast cancer mammogram image processing algorithms. …”
Get full text
Get full text
Get full text
Book Chapter -
17
Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine
Published 2023“…The SVM algorithm has been used to detect high- and low-density vegetation regions from the extracted ROI. …”
text::Thesis -
18
-
19
Chain coding and pre processing stages of handwritten character image file
Published 2010“…There are many pre-processing functions and methods that can be used and different research works will use different methods. …”
Get full text
Get full text
Get full text
Article -
20
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…This learning algorithm represents an automatic generation of membership functions and rules from the data. …”
Get full text
Get full text
Thesis
