Search Results - (( using function method algorithm ) OR ( using extraction process algorithm ))

Refine Results
  1. 1
  2. 2

    A fingerprint matching algorithm using bit-plane extraction method with phase-only correlation by Florence, Francis-Lothai, Bong, David B L

    Published 2017
    “…Region of interest (ROI) of a fingerprint image is extracted by using a modified blob analysis method, and then the core point of the ROI is detected for dimension reduction process. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Pashto language stemming algorithm by Aslamzai, Sebghatullah, Saidah Saad

    Published 2015
    “…Furthermore, the accuracy and strength of the proposed algorithm is evaluated using word count method. To validate the function of the developed algorithm, two native speakers of Pashto were recruited to evaluate the algorithm in terms of its accuracy and strength. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Using genetic algorithms as image watermarking performance optimizer / Zuhaili Zahid by Zahid, Zuhaili

    Published 2008
    “…As a result, these errors will produce less accurate results during the process of extraction to the original watermark. Thus, this project will introduce a genetic-algorithms-based technique to overcome the rounding error problem. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Chain coding and pre processing stages of handwritten character image file by Suliman, Azizah, Sulaiman, Md. Nasir, Othman, Mohamed, O. K. Rahmat, Rahmita Wirza

    Published 2010
    “…There are many pre-processing functions and methods that can be used and different research works will use different methods. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Jogging activity recognition using k-NN algorithm by Afifah Ismail

    Published 2022
    “…The k-NN algorithm is a simple and easy-to-implement supervised machine learning algorithm that can be used to solve both classification and regression problems. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  7. 7

    Image classification using two dimensional wavelet coefficients with parallel computing by Ong, Yew Fai

    Published 2020
    “…The raster graphics are decomposed using various kind of wavelets together with numerous type of methods in this research to examine the process and the output coefficients of wavelet transform. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8
  9. 9

    Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad by Ahmad, Khairul Adilah

    Published 2018
    “…Therefore, this research has designed fuzzy learning algorithm that is able to classify fruits based on their shape and size features using Harumanis dataset. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Identifying Students' Summary Writing Strategies Using Summary Sentence Decomposition Algorithm by Idris, Norisma, Baba, Mohd Sapiyan, Abdullah, Rukaini

    Published 2011
    “…We first analyzed experts' written summaries, extracted the strategies used in the summaries, formulated a set of heuristics rules to define the strategies and finally transformed the rules using position-based method into summary sentence decomposition algorithm (SSDA). …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani by Seyed Asadollah, Abdiesfandani

    Published 2016
    “…To evaluate the algorithm, we conducted two experiments. In the first experiment, we examine the functionality of the system, whether the system is able to identify the summarizing strategies used by students in summary writing. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Hybrid subjective evaluation method using weighted subsethood - based (WSBA) rule generation algorithm by Othman, Mahmod, Khalid, Shaiful Annuar, Abdullah, Fader, Amir Hamzah, Shezrin Hawani, Ku-Mahamud, Ku Ruhana

    Published 2013
    “…The use of fuzzy rules, which were extracted directly from input data through Weighted Subsethood-based (WSBA) Rule Generation Algorithm.WSBA rule generation use the subsethood values to generate the weights which finally produced the fuzzy general rules.The rules generated through the data provided knowledge in developed fuzzy rule The fuzzy rules embedded in the framework of subjective evaluation method showed advantages in generalizing the evaluation of the performance achievement, where the evaluation process can be conducted consistently in producing good evaluation results with the use of the membership set score.The results from the numerical examples are comparable to other fuzzy evaluation methods, even with the use of small rule size.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Hybrid subjective evaluation of rule Exraction Algorithm using Weighted Subsethood-Based (WSBA) by Othman, Mahmod, Ku-Mahamud, Ku Ruhana, Hawani, Shezrin, Hamzah, Amir, Khalid, Shaiful Annuar, Abdullah, Fader

    Published 2013
    “…Fuzzy rules are important elements that being highlighted in any fuzzy expert system.This research proposes the framework of subjective performance evaluation using fuzzy technique for ranking the performance of the financial performance of a company under a multi criteria environment.There are a lot of techniques used such as fuzzy similarity function, fuzzy synthetic decision and satisfaction function have been adopted.The framework is based on fuzzy multi-criteria decision-making that consists of fuzzy rules.The use of fuzzy rules, which were extracted directly from input data through Weighted Subsethood-based (WSBA) Rule Generation Algorithm.WSBA rule generation use the subsethood values to generate the weights which finally produced the fuzzy general rules.The rules generated through the data provided knowledge in developed fuzzy rule The fuzzy rules embedded in the framework of subjective evaluation method showed advantages in generalizing the evaluation of the performance achievement, where the evaluation process can be conducted consistently in producing good evaluation results with the use of the membership set score.The results from the numerical examples are comparable to other fuzzy evaluation methods, even with the use of small rule size.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…The method employs Semantic Tags Extraction (STSE) algorithm to extract semantic tags of an element and Element Enrichment (EERM) algorithm to enrich the elements. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    A hybrid approach for artificial immune recognition system / Mahmoud Reza Saybani by Mahmoud Reza, Saybani

    Published 2016
    “…The increasing size of data being stored have created the need for computer-based methods for automatic data analysis. Many researchers, who have developed methods and algorithms within the field of artificial intelligence, machine learning and data mining, have addressed extracting useful information from the data. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Color Image Segmentation Based on Bayesian Theorem for Mobile Robot Navigation by Rahimizadeh, Hamid

    Published 2009
    “…Object extraction and object recognition are typical applications that use segmentation as a low level image processing. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Image Steganography Using Hash Function And Compression by Ahmad Sulaiman, Zurkifli

    Published 2023
    “…Prior to and following the embedding of a message image, the cover image is hashed using the hash function. The hash function will be used in the stego image, and the result will be kept in the host image for additional verification throughout the extraction process. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    A study on component-based technology for development of complex bioinformatics software by Ali Shah, Zuraini, Deris, Safaai, Othman, Muhamad Razib, Zakaria, Zalmiyah, Saad, Puteh, Hassan, Rohayanti, Muda, Mohd. Hilmi, Kasim, Shahreen, Roslan, Rosfuzah

    Published 2004
    “…The second layer uses discriminative SVM algorithm with a state-of-the-art string kernel based on PSI-BLAST profiles that is used to leverage the unlabeled data. …”
    Get full text
    Get full text
    Monograph