Search Results - (( using function methods algorithm ) OR ( a extraction method algorithm ))

Refine Results
  1. 1

    A fingerprint matching algorithm using bit-plane extraction method with phase-only correlation by Florence, Francis-Lothai, Bong, David B L

    Published 2017
    “…Region of interest (ROI) of a fingerprint image is extracted by using a modified blob analysis method, and then the core point of the ROI is detected for dimension reduction process. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Utilizing artificial bee colony algorithm as feature selection method in Arabic text classification by Hijazi, Musab, Zeki, Akram M., Ismail, Amelia Ritahani

    Published 2023
    “…Support Vector Machine and Naïve Bayes classifiers were used as a fitness function for the ABC algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Cuckoo search algorithm and wind driven optimization based study of satellite image segmentation for multilevel thresholding using Kapur’s entropy by Bhandari, A.K., Singh, V.K, Kumar, A., Singh, G.K.

    Published 2014
    “…This algorithm is used to obtain the best solution or best fitness value from the initial random threshold values, and to evaluate the quality of a solution, correlation function is used. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Pashto language stemming algorithm by Aslamzai, Sebghatullah, Saidah Saad

    Published 2015
    “…Furthermore, the accuracy and strength of the proposed algorithm is evaluated using word count method. To validate the function of the developed algorithm, two native speakers of Pashto were recruited to evaluate the algorithm in terms of its accuracy and strength. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms by Ridha, Hussein Mohammed

    Published 2020
    “…Therefore, precisely modeling method to determine the unknown parameters of the PV module is essential to give a realistic evaluation for the extracted energy of the PV array. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Using genetic algorithms as image watermarking performance optimizer / Zuhaili Zahid by Zahid, Zuhaili

    Published 2008
    “…Image watermarking is a method to hide a message in an image for transmission of secret data or identification purposes. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Jogging activity recognition using k-NN algorithm by Afifah Ismail

    Published 2022
    “…To recognize and classify the level of jogging intensity, k-Nearest Neighbours (k-NN) algorithms will be considered as a machine learning method. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  10. 10

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…The method employs Semantic Tags Extraction (STSE) algorithm to extract semantic tags of an element and Element Enrichment (EERM) algorithm to enrich the elements. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani by Seyed Asadollah, Abdiesfandani

    Published 2016
    “…Summarizing strategies include a set of conscious tasks that are used to determine important information and extract the main idea of a source text. …”
    Get full text
    Get full text
    Thesis
  12. 12

    An improvement of back propagation algorithm using halley third order optimisation method for classification problems by Abdul Hamid, Norhamreeza

    Published 2020
    “…Back Propagation (BP) has proven to be a robust algorithm for different connectionist learning problems which commonly available for any functional induction that provides a computationally efficient method. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Logic Programming In Radial Basis Function Neural Networks by Hamadneh, Nawaf

    Published 2013
    “…In this thesis, I established a new method for determining the best number of the hidden neurons in radial basis function neural networks. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Hybrid subjective evaluation method using weighted subsethood - based (WSBA) rule generation algorithm by Othman, Mahmod, Khalid, Shaiful Annuar, Abdullah, Fader, Amir Hamzah, Shezrin Hawani, Ku-Mahamud, Ku Ruhana

    Published 2013
    “…The use of fuzzy rules, which were extracted directly from input data through Weighted Subsethood-based (WSBA) Rule Generation Algorithm.WSBA rule generation use the subsethood values to generate the weights which finally produced the fuzzy general rules.The rules generated through the data provided knowledge in developed fuzzy rule The fuzzy rules embedded in the framework of subjective evaluation method showed advantages in generalizing the evaluation of the performance achievement, where the evaluation process can be conducted consistently in producing good evaluation results with the use of the membership set score.The results from the numerical examples are comparable to other fuzzy evaluation methods, even with the use of small rule size.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Image classification using two dimensional wavelet coefficients with parallel computing by Ong, Yew Fai

    Published 2020
    “…This research algorithm demonstrated a very promising result with Support Vector Machines, this algorithm produces a 90% of accuracies whereas the decision tree algorithm gets 100% accuracies. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine by Fathi Mahdi Elsiddig Haroun, Mr.

    Published 2023
    “…Also, a corridor extraction algorithm has been developed to extract the region of interest (ROI) around the transmission towers. …”
    text::Thesis
  17. 17
  18. 18

    Chain coding and pre processing stages of handwritten character image file by Suliman, Azizah, Sulaiman, Md. Nasir, Othman, Mohamed, O. K. Rahmat, Rahmita Wirza

    Published 2010
    “…In classifying handwritten characters, the stages prior to the classification phase play a role as major as the classification itself. There are many pre-processing functions and methods that can be used and different research works will use different methods. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad by Ahmad, Khairul Adilah

    Published 2018
    “…This reserarch adapted a methodology of computer vision and algorithms that exploit image segmentation, feature extraction and fuzzy classification to guide the research activities. …”
    Get full text
    Get full text
    Thesis
  20. 20