Search Results - (( using normalization based algorithm ) OR ( using factorization matching algorithm ))

Refine Results
  1. 1

    Concept Based Lattice Mining (CBLM) using Formal Concept Analysis (FCA) for text mining by Mumtazimah, Mohamad, Hassan, H., Mohd Saman, M.Y, Abdullah, Z.

    Published 2019
    “…Extracting relevant resources according to a query is imperative due to the factors of time and accuracy. This study proposes a model that enables query matching using output lattices from Formal Concept Analysis (FCA) tool, based on Graph Theory. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Scale-invariant and adaptive-search template matching for monocular visual odometry in low-textured environment by Aqel, Mohammad O. A.

    Published 2016
    “…The maximum allowable vehicle speed for the developed VO is up to 6.3 m/s.In short, the developed VO system, as well as the proposed algorithms and techniques, were successfully implemented, tested, and validated using real time kinematic GPS (RTK-GPS) with 2 cm positioning accuracy. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Concept Based Lattice Mining (CLBM) Using Formal Concept Analysis (FCA) for Text Mining by Hasni, Hassan, Mumtazimah, Mohamad, Md Yazid, Mohamad Saman

    Published 2019
    “…Extracting relevant resources according to a query is imperative due to the factors of time and accuracy. This study proposes a model that enables query matching using output lattices from Formal Concept Analysis (FCA) tool, based on Graph Theory. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Characterization of oil palm fruitlets using artificial neural network by Olukayode, Ojo Adedayo

    Published 2014
    “…The results also showed that contrary to the widely reported gap between the accuracy of the LM algorithm and other feed forward neural network training algorithms, the RP trained network performed as good as that of the LM algorithm for the range of data considered. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Spatial Simulation for Flood Disaster Forecasting: A Geospatial Technology-based Group Analytic Hierarchy Process Approach by Dano Lawal, Umar, Matori, Abdul Nasir, Wan Yusof, Khamaruzaman, Mustafa Hashim , Ahmad, Aminu, Mansir, Sabri, Soheil, Balogun, Abdul-Lateef, Ahmed Chandio, Imtiaz, Radin Mohd Mokhtar, Munirah

    Published 2013
    “…In validating the robustness of the result, known Flood Extent Extraction Model developed based on a Neural Network Algorithm embedded in ENVI 4.8 software was used. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Early detection of high water saturation spots for landslide prediction using thermal image analysis by Aufa Huda, Muhammad Zin

    Published 2018
    “…There are three segmentation algorithm used in this study which are HSV, K-Means and Feature Matching. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Selection of prospective workers using profile matching algorithm on crowdsourcing platform by Cucus, Ahmad, Aji, Luhur Bayu, Al Fahim, Mubarak Ali, Aminuddin, Afrig, Farida, Lilis Dwi

    Published 2022
    “…The criteria used to find a match between workers and the work offered consist of two parts, core factors and secondary factors. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Biometric identification and recognition for iris using failure rejection rate (FRR) / Musab A. M. Ali by M. Ali, Musab A.

    Published 2016
    “…Next, select smaller yet optimal and effective normalized iris image size by applying different normalization factors. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Auditory evoked potential in normal hearing and sensorineural hearing loss among Malay and Chinese adults / Ibrahim Amer Ibrahim by Ibrahim Amer , Ibrahim

    Published 2019
    “…This study presents accurate and novel formulated indices for classifying brain auditory responses and human hearing abilities. A classification algorithm was used to classify the CAEP responses evoked from multiple auditory stimulus for normal hearing subjects and SNHL patients in the case of both ethnicities. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Stereo Matching Algorithm Based On Per Pixel Difference Adjustment, Iterative Guided Filter And Graph Segmentation by Hamzah, Rostam Affendi, Ibrahim, Haidi, Abu Hassan, Anwar Hasni

    Published 2017
    “…Stereo matching process is a difficult and challenging task due to many uncontrollable factors that affect the results. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Disparity map algorithm for stereo matching process using local based method by Gan, Melvin Yeou Wei

    Published 2022
    “…The proposed SVDM algorithm involves four stages which starts from matching cost computation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Car License Plate Recognition by Using Template Matching Algorithm by Arina, Yusuf, Asrani, Lit, Annisa, Jamali

    Published 2014
    “…CLPR is developed to recognise the car license plate with the implementation of Digital Image Processing (DIP) and Template Matching Algorithm (TMA) approach by using the MATLAB software. …”
    Get full text
    Get full text
    Book
  15. 15

    Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman by Che Osman, Siti Eshah

    Published 2019
    “…Due to the center biased nature of the videos, the HPSO algorithm uses an initial pattern (hexagon-shaped) to speed up the convergence of the algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  17. 17

    An alternative approach to normal parameter reduction algorithms for decision making using a soft set theory / Sani Danjuma by Sani , Danjuma

    Published 2017
    “…In addition, the algorithm was relatively easy to understand compare to the state of the art of normal parameter reduction algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation by Abu, Ahmad Zaidee

    Published 2008
    “…The proposed approach uses a frequency domain combinational framework of coefficients scrambling with Key Scheduling Algorithm based (KSA-based) permutation. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20