Search Results - probable extraction method algorithm*

Refine Results
  1. 1

    Towards a Malay derivational lexicon: learning affixes using expectation maximization by Sulaiman, Suriani, Gasser, Michael, Kubler, Sandra

    Published 2011
    “…We extract the set of affix patterns produced by our algorithm and evaluate them against two references: a list of affix patterns extracted from our hand-segmented derivational wordlist and a derivational history produced by a stemmer.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    Adaptive Similarity Component Analysis in Nonparametric Dynamic Environment by Sojodishijani, Omid

    Published 2011
    “…From a dimensionality reduction evaluation aspect, the average misclassification error of the proposed method in low-rank feature space is 9.6% and same error rate for three other well-known feature extraction methods is 21.21%. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Fusion of airborne LiDAR with multispectral SPOT 5 image for enhancement of feature extraction using Dempster–Shafer theory by Saeidi, Vahideh, Pradhan, Biswajeet, Idrees, Mohammed Oludare, Abd Latif, Zulkiflee

    Published 2014
    “…This study proves that DST is a time- and cost-effective method for accurate land-cover feature identification and extraction without the need for a prior knowledge of the scene. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    Color Image Segmentation Based on Bayesian Theorem for Mobile Robot Navigation by Rahimizadeh, Hamid

    Published 2009
    “…Bayesian classification and decision making are based on probability theory and choosing the most probable or the lowest risk. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Spam image filtering algorithm / Muhammad Hazim Shahimi by Shahimi, Muhammad Hazim

    Published 2015
    “…This project is done to help the internet user from being flood by the spam especially spam images. The algorithm in this project will help the existing current spam filtering to enhance the method in filtering spam images. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Forecasting Tourism Market for Fiji based on Indicator Approach by Soh, Ann Ni

    Published 2019
    “…Apart from utilising the composite leading indicator approach, a filtering extraction method, a dating algorithm for turning point detection and directional accuracy and binomial tests, this study also included Markov regime switching as well, for identifying the transition probabilities. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Vehicle logo recognition using whitening transformation and deep learning by Soon, Foo Chong, Khaw, Hui Ying, Chuah, Joon Huang, Kanesan, Jeevan

    Published 2019
    “…Unlike most of the common traditional methods that employ handcrafted visual features, our proposed method is able to automatically learn and extract high-level features for the classification task. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13

    Skyline queries on data with uncertain dimensions for efficient computation by Mohd Saad, Nurul Husna

    Published 2018
    “…We propose a twophase framework, SkyQUD, which integrates these four methods; the first phase employs efficient probability computations which are performed individually on groups of objects with exact values and continuous ranges, respectively. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    A new descriptor for smile classification based on cascade classifier in unconstrained scenarios by Hassen, Oday Ali, Abu, Nur Azman, Zainal Abidin, Zaheera, Saad, Mohamed Darwish

    Published 2021
    “…In this paper, an adaptive model for smile classification is suggested that integrates a row-transform-based feature extraction algorithm and a cascade classifier to increase the precision of facial recognition. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    An effective source number enumeration approach based on SEMD by Ge, Shengguo, Mohd Rum, Siti Nurulain, Ibrahim, Hamidah, Marsilah, Erzam, Perumal, Thinagaran

    Published 2022
    “…Experiment shows that SEMD can effectively restrain the end effect, and the source number enumeration algorithm based on SEMD has a higher correct detection probability than others.…”
    Get full text
    Get full text
    Article
  18. 18

    An improved binary method for scalar multiplication in elliptic curve cryptography by Mohamed, Mohamad Afendee, Md. Said, Mohamad Rushdan, Mohd Atan, Kamel Ariffin, Ahmad Zulkarnain, Zuriati

    Published 2010
    “…Approach: In this study we proposed an improved binary method which reads input block by block basis. Instead of having to add one to current chain every time non zero digit appears, this method requires one addition for every non zero block. …”
    Get full text
    Get full text
    Article
  19. 19

    An adaptive face recognition under constrained environment for smartphone database by Hassan, Noor Amjed

    Published 2018
    “…Finally, this study aims to obtain high-accuracy face recognition performance under the uncontrolled environment of a smartphone database based on the proposed adaptive face recognition method that combines two new face recognition algorithms. …”
    Get full text
    Get full text
    Thesis
  20. 20