Search Results - (( variable extraction method algorithm ) OR ( variable extractions means algorithm ))

Refine Results
  1. 1
  2. 2

    HEP-2 CELL IMAGES CLASSIFICATION BASED ON STATISTICAL TEXTURE ANALYSIS AND FUZZY LOGIC by Jamil, Nur Farahim

    Published 2014
    “…The algorithm gives a mean accuracy of 84% out of 125 test images.…”
    Get full text
    Get full text
    Final Year Project
  3. 3

    HEp-2 cell images classification based on statistical texture analysis and fuzzy logic by Jamil, N.F.B., Faye, I., May, Z.

    Published 2014
    “…This paper proposes a pattern recognition algorithm consisting of statistical methods to extract seven textural features from the HEp-2 cell images followed by classification of staining patterns by using fuzzy logic. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Improved measurement of blood pressure by extraction of characteristic features from the cuff oscillometric waveform by Lim, P.K., Ng, S.C., Jassim, W.A., Redmond, S.J., Zilany, M., Avolio, A., Lim, E., Tan, M.P., Lovell, N.H.

    Published 2015
    “…Using the sequential forward floating selection (SFFS) approach, we were able to achieve a significant reduction in the mean and standard deviation of differences between the estimated SBP values and the reference scoring (MLR: mean +/- SD = -0.3 +/- 5.8 mmHg; SVR and -0.6 +/- 5.4 mmHg) with only two features, i.e., Ratio(2) and Area(3), as compared to the conventional maximum amplitude algorithm (MAA) method (mean +/- SD = -1.6 +/- 8.6 mmHg). …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Liver segmentation on CT images using random walkers and fuzzy c-means for treatment planning and monitoring of tumors in liver cancer patients by Moghbel, Mehrdad

    Published 2017
    “…Based on the location of the lung, the liver dome is automatically detected and the liver is then extracted by random walkers method and refined using a fuzzy level set method. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Towards enhanced remaining useful life prediction of lithium-ion batteries with uncertainty using optimized deep learning algorithm by Reza M.S., Hannan M.A., Mansor M., Ker P.J., Rahman S.A., Jang G., Mahlia T.M.I.

    Published 2025
    “…However, existing RUL prediction approaches have difficulties with variability and nonlinearity that occur during battery degradation, data extraction, feature extraction, hyperparameters optimization, and prediction model uncertainty. …”
    Article
  8. 8

    Classification and prediction analysis for weld bead surface quality using feature extraction and mahalanobis-taguchi system by Nolia, Harudin, Muhammad Ikmal Hafiz, Mohd Yusof, Zulkifli, Marlah@Marlan, Faizir, Ramlie, Wan Zuki Azman, Wan Muhamad, Mohd Yazid, Abu, Zamzuraida, Baharum

    Published 2025
    “…The results reveal that while the K-means clustering method outperforms the Variable Bin Width method across several performance metrics, including an accuracy of 86.36% and a high specificity of 94.5%, the method’s recall rate of 50.49% indicates room for improvement in identifying true positives. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    High-Resolution Downscaling with Interpretable Relevant Vector Machine: Rainfall Prediction for Case Study in Selangor by Abdul Rashid, Raghdah Rasyidah, Shaharudin, Shazlyn Milleana, Sulaiman, Nurul Ainina Filza, Zainuddin, Nurul Hila, Mahdin, Hairulnizam, Mohd Najib, Summayah Aimi, Hidayat, Rahmat

    Published 2024
    “…The Principal Component Analysis (PCA) technique was employed to choose relevant environmental variables as input for the machine learning model, and various imputation methods were utilized to manage missing data, such as mean imputation and the KNN algorithm. …”
    Get full text
    Get full text
    Article
  10. 10

    Development of sorting system for oil palm in vitro shoots using machine vision approach by Al-Ruhaimi, Hamdan Yahya Ahmed

    Published 2014
    “…Region-based features, namely area, centroid, aspect ratio, extent and two cropping points have been represented in the shape of OPTC in vitro shoots. By using k-means algorithm the extracted features have been evaluated. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Detection and Classification of Moving Objects for an Automated Surveillance System by Md. Tomari, Mohd Razali

    Published 2006
    “…Finally, classification algorithm that makes use of the extracted moment values from the detected objects successfully categorize objects into pre-defined classes of human and vehicle with 89.08% of accuracy. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Detection and classification of moving objects for an automated surveillance system by Md Tomari, Mohd Razali

    Published 2006
    “…Finally, classification algorithm that makes use of the extracted moment values from the detected objects successfully categorize objects into pre-defined classes of human and vehicle with 89.08% of accuracy. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Feature detector-level fusion methods in food recognition by Razali @ Ghazali, Mohd Norhisham, Manshor, Noridayu

    Published 2019
    “…Therefore, this paper investigates the methods to fuse multiple features extracted from food images. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Estimation of non-contact smartphone video-based vital sign monitoring using filtering and standard color conversion techniques by Qayyum, A., Malik, A.S., Shuaibu, A.N., Nasir, N.

    Published 2018
    “…Furthermore, the color distortion filtering method is used for pre-processing in order to extract the less noisy YCbCr signal. …”
    Get full text
    Get full text
    Article
  15. 15

    Detection and classification of moving objects for an automated surveillance system by Md Tomari, Mohd Razali

    Published 2006
    “…Finally, classification algorithm that makes use of the extracted moment values from the detected objects successfully categorize objects into pre-defined classes of human and vehicle with 89.08% of accuracy. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Magnetic resonance imaging sense reconstruction system using FPGA / Muhammad Faisal Siddiqui by Muhammad Faisal , Siddiqui

    Published 2016
    “…Moreover, the proposed classifier technique is significantly faster than the recent well known methods, and it improves the efficiency by 71%, 3%, and 4% on feature extraction stage, feature reduction stage, and classification stage, respectively. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Clinical relevance of VKORC1 (G-1639A and C1173T) and CYP2C9*3 among patients on warfarin by Teh, L. K., Langmia, I. M., M. H., Fazleen Haslinda, Ngow, Harris Abdullah, Roziah, M. J., Harun, R., Zakaria, Z. A., Salleh, M. Z.

    Published 2011
    “…Among the parameters evaluated, only VKORC1 (G-1639A) and (C1173T) alleles, and age correlated with warfarin dose at 6 month. The mean dose predicted using the algorithm derived from cohort 1 was lower than the actual dose for cohort 2 (3·30 mg, SD 0·84 vs. 3·45 mg, SD 1·42). …”
    Get full text
    Get full text
    Article
  19. 19

    Perturbation stochastic model updating of a bolted structure / Mohamad Azam Shah Aziz Shah by Aziz Shah, Mohamad Azam Shah

    Published 2022
    “…The stochastic model updating (SMU) method based on perturbation theory offers many advantages in predicting the dynamic behaviour of an engineering structure under conditions of variability and uncertainty with high accuracy and at low cost solutions. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…Many programming languages are used for programming; Java programming language is known to be most common due to its features, the use of this popular language increases an attacker's ability to steal intellectual property (IP), as the source program is translated to an intermediate format retaining most of the information such as meaningful variables names present in source code. An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
    Get full text
    Get full text
    Thesis