Search Results - (( using function method algorithm ) OR ( pre extraction method algorithm ))
Search alternatives:
- extraction method »
- method algorithm »
- function method »
- using function »
- pre extraction »
-
1
Chain coding and pre processing stages of handwritten character image file
Published 2010“…In this paper detailed descriptions of the algorithms used in the pre-processing and feature extraction phases of an offline handwritten character are discussed. …”
Get full text
Get full text
Get full text
Article -
2
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…To evaluate the algorithm, we conducted two experiments. In the first experiment, we examine the functionality of the system, whether the system is able to identify the summarizing strategies used by students in summary writing. …”
Get full text
Get full text
Thesis -
3
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…In addition, this research does not require any pre-stored database to train the algorithm. This research requires the supervision from the users to train the algorithm by naming the region. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…The method employs Semantic Tags Extraction (STSE) algorithm to extract semantic tags of an element and Element Enrichment (EERM) algorithm to enrich the elements. …”
Get full text
Get full text
Get full text
Thesis -
5
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…This learning algorithm represents an automatic generation of membership functions and rules from the data. …”
Get full text
Get full text
Thesis -
6
-
7
A hybrid approach for artificial immune recognition system / Mahmoud Reza Saybani
Published 2016“…The increasing size of data being stored have created the need for computer-based methods for automatic data analysis. Many researchers, who have developed methods and algorithms within the field of artificial intelligence, machine learning and data mining, have addressed extracting useful information from the data. …”
Get full text
Get full text
Thesis -
8
Leveraging CQT-VMD and pre-trained AlexNet architecture for accurate pulmonary disease classification from lung sound signals
Published 2025“…This study presents a novel algorithm for classifying pulmonary diseases using lung sound signals by integrating Variational Mode Decomposition (VMD) and the Constant-Q Transform (CQT) within a pre-trained AlexNet convolutional neural network. …”
Get full text
Get full text
Get full text
Article -
9
Image clustering comparison of two color segmentation techniques
Published 2010“…There are many algorithm for analysing clustering each having its own method to do clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Projecting named entity tags from a resource rich language to a resource poor language
Published 2012“…The method computes the string similarity between the English words and the list of available lexemes in a pre-built lexicon that approximates the best NE mapping.The algorithm has been effectively evaluated using our own terrorism tagged corpus; it achieved satisfactory results in terms of precision, recall, and F-measure.An evaluation of the selected open source NER tool for English is also presented.…”
Get full text
Get full text
Get full text
Article -
11
Projecting named entity tags from a resource rich language to a resource poor language
Published 2013“…This article focuses on the person (PER), organization (ORG) and location (LOC) entities for a Malay journalistic corpus of terrorism. A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism. …”
Get full text
Get full text
Article -
12
Projecting named entity tags from a resource rich language to a resource poor language
Published 2013“…This article focuses on the person (PER), organization (ORG) and location (LOC) entities for a Malay journalistic corpus of terrorism. A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism. …”
Get full text
Get full text
Article -
13
Projecting named entity tags from a resource rich language to a resource poor language
Published 2013“…This article focuses on the person (PER), organization (ORG) and location (LOC) entities for a Malay journalistic corpus of terrorism. A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism. …”
Get full text
Get full text
Article -
14
Establishment of spectral subtraction-based algorithm for experimental modal analysis under operating condition
Published 2022“…It was suggested this method be applied prior to FRF calculation to enhance the EMA procedure under ambient operating forces.…”
Get full text
Get full text
Thesis -
15
The classification of wink-based eeg signals by means of transfer learning models
Published 2021“…The implementation of pre-processing algorithms has been demonstrated to be able to mitigate the signal noises that arises from the winking signals without the need for the use signal filtering algorithms. …”
Get full text
Get full text
Thesis -
16
A study on component-based technology for development of complex bioinformatics software
Published 2004“…The second layer uses discriminative SVM algorithm with a state-of-the-art string kernel based on PSI-BLAST profiles that is used to leverage the unlabeled data. …”
Get full text
Get full text
Monograph -
17
Recognition of the cursive handwritten courtesy amounts of Malaysian bank cheques.
Published 2001“…Three type of feature extraction methods which are transitions, shapes and moment invariant are used to extract local and global features of segmented handwritten digits. …”
Get full text
Get full text
Conference or Workshop Item -
18
New Instances Classification Framework On Quran Ontology Applied To Question Answering System
Published 2019“…As a result, the instances classification framework consists of several essential components: pre-processing, morphology analysis, semantic analysis, feature extraction, instances classification with Radial Basis Function Networks algorithm, and the transformation module. …”
Get full text
Get full text
Get full text
Article -
19
Identifying and detecting unlawful behavior in video images using genetic algorithm / Shahirah Mohamed Hatim
Published 2016“…GA is used as the method of unlawful behavior detection. …”
Get full text
Get full text
Thesis -
20
FEATURES EXTRACTION OF HEP-2 IMMUNOFLUORESCENCE PATTERNS BASED ON TEXTURE AND REGION OF INTEREST TECHNIQUES
Published 2013“…Different methods of features extraction will be used and compared for better outcome. …”
Get full text
Get full text
Final Year Project
