Search Results - adoption using different extraction algorithm*

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Feature extraction from natural language to aid requirements reuse in software product lines engineering / Noor Hasrina Bakar by Noor Hasrina, Bakar

    Published 2016
    “…Then, linguistic tagging is applied to extract software features followed by applying simple clustering algorithms to form groups of common features. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    A New Bit-Plane Extraction Approach for Fingerprint Recognition Using Phase-Only Correlation Function by Florence, Francis Lothai

    Published 2016
    “…POC based recognition method is adopted because of its simplicity and ability to achieve high accuracy compared to other recognition algorithms, especially for low quality fingerprint image. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Identification of Electrooculography Signals Frequency Energy Distribution Using Wavelet Algorithm by W. Daud, W. M. Bukhari, Sudirman, Rubita, Omar, Camallil

    Published 2011
    “…Statistically, the results in this study indicate that there are 93% (averages) significance differences in the extracted features of wavelet Scalogram analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN by SARI, YUNITA SARI

    Published 2011
    “…In our research, extraction pattern from the first module will be fed to this algorithm and is used to make the prediction of named entity candidate category. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Using genetic algorithms as image watermarking performance optimizer / Zuhaili Zahid by Zahid, Zuhaili

    Published 2008
    “…The process of embedding and retracting the data cause the original embedded data to be distorted as a side effect of the current method used. Due to the frequently use of rounding approach, embedded data or watermark hidden in an image is retrieved differently from the original watermark (Shih et al, 2004). …”
    Get full text
    Get full text
    Thesis
  11. 11

    Development of deep learning based user-friendly interface for fruit quality detection by Mohd Ali, Maimunah, Hashim, Norhashila

    Published 2024
    “…These image datasets encompass diverse information which requires extensive data extraction. To overcome this issue, a deep learning approach using convolutional neural network was used to evaluate the fruit quality. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…This paper presents a classification of android malware using candidate detectors generated from an unsupervised association rule of Apriori algorithm improved with particle swarm optimization to train three different supervised classifiers. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    Acoustic echo cancellation using adaptive filtering algorithms for quranic accents (Qiraat) identification by Kamarudin, Noraziahtulhidayu, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Abushariah, Mohammad A. M., Hashim, Shaiful Jahari, Hassan Azhari, Abd Rauf

    Published 2015
    “…Once clean Quranic signals are produced, they undergo feature extraction and pattern classification phases. The Mel Frequency Cepstral Coefficients is the most widely used technique for feature extraction and is adopted in this research work, whereas probabilities principal component analysis (PPCA), K-nearest neighbor (KNN) and gaussian mixture model (GMM) are used for pattern classification. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16

    The classification of wink-based eeg signals by means of transfer learning models by Jothi Letchumy, Mahendra Kumar

    Published 2021
    “…The implementation of pre-processing algorithms has been demonstrated to be able to mitigate the signal noises that arises from the winking signals without the need for the use signal filtering algorithms. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A Bayesian probability model for Android malware detection by Sharfah Ratibah, Tuan Mat, Mohd Faizal, Ab Razak, Mohd Nizam, Mohmad Kahar, Juliza, Mohamad Arif

    Published 2021
    “…The experiment was then conducted using two algorithms for feature selection: information gain and chi-square. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Development and implementation of GPS for location tracking / Ahmad Ashraff Ariffin by Ariffin, Ahmad Ashraff

    Published 2011
    “…The microcontroller will be used to parse the NMEA data sentences and calculate the algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Songket pattern classification using backpropagation neural network / Nik Aidil Syawalni Nik Mazlan by Nik Mazlan, Nik Aidil Syawalni

    Published 2024
    “…The process included data pre-processing and feature extraction. The BPNN algorithm was implemented to proficiently identify and classify Songket pattern, and the evaluation involved analyzing predicted results with different data splitting ratios, such as 70:30 and 80:20. …”
    Get full text
    Get full text
    Thesis
  20. 20