Search Results - probable extraction method algorithm*
Search alternatives:
- probable extraction »
- extraction method »
- method algorithm »
-
1
Towards a Malay derivational lexicon: learning affixes using expectation maximization
Published 2011“…We extract the set of affix patterns produced by our algorithm and evaluate them against two references: a list of affix patterns extracted from our hand-segmented derivational wordlist and a derivational history produced by a stemmer.…”
Get full text
Get full text
Get full text
Proceeding Paper -
2
Adaptive Similarity Component Analysis in Nonparametric Dynamic Environment
Published 2011“…From a dimensionality reduction evaluation aspect, the average misclassification error of the proposed method in low-rank feature space is 9.6% and same error rate for three other well-known feature extraction methods is 21.21%. …”
Get full text
Get full text
Thesis -
3
Fusion of airborne LiDAR with multispectral SPOT 5 image for enhancement of feature extraction using Dempster–Shafer theory
Published 2014“…This study proves that DST is a time- and cost-effective method for accurate land-cover feature identification and extraction without the need for a prior knowledge of the scene. …”
Get full text
Get full text
Article -
4
Car recognition using Bayes Classifier / Nur Atiqah Mat Samadi
Published 2017Get full text
Get full text
Thesis -
5
-
6
Color Image Segmentation Based on Bayesian Theorem for Mobile Robot Navigation
Published 2009“…Bayesian classification and decision making are based on probability theory and choosing the most probable or the lowest risk. …”
Get full text
Get full text
Thesis -
7
Spam image filtering algorithm / Muhammad Hazim Shahimi
Published 2015“…This project is done to help the internet user from being flood by the spam especially spam images. The algorithm in this project will help the existing current spam filtering to enhance the method in filtering spam images. …”
Get full text
Get full text
Thesis -
8
Forecasting Tourism Market for Fiji based on Indicator Approach
Published 2019“…Apart from utilising the composite leading indicator approach, a filtering extraction method, a dating algorithm for turning point detection and directional accuracy and binomial tests, this study also included Markov regime switching as well, for identifying the transition probabilities. …”
Get full text
Get full text
Thesis -
9
-
10
Vehicle logo recognition using whitening transformation and deep learning
Published 2019“…Unlike most of the common traditional methods that employ handcrafted visual features, our proposed method is able to automatically learn and extract high-level features for the classification task. …”
Get full text
Get full text
Article -
11
-
12
-
13
Skyline queries on data with uncertain dimensions for efficient computation
Published 2018“…We propose a twophase framework, SkyQUD, which integrates these four methods; the first phase employs efficient probability computations which are performed individually on groups of objects with exact values and continuous ranges, respectively. …”
Get full text
Get full text
Thesis -
14
-
15
A new descriptor for smile classification based on cascade classifier in unconstrained scenarios
Published 2021“…In this paper, an adaptive model for smile classification is suggested that integrates a row-transform-based feature extraction algorithm and a cascade classifier to increase the precision of facial recognition. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
-
17
An effective source number enumeration approach based on SEMD
Published 2022“…Experiment shows that SEMD can effectively restrain the end effect, and the source number enumeration algorithm based on SEMD has a higher correct detection probability than others.…”
Get full text
Get full text
Article -
18
An improved binary method for scalar multiplication in elliptic curve cryptography
Published 2010“…Approach: In this study we proposed an improved binary method which reads input block by block basis. Instead of having to add one to current chain every time non zero digit appears, this method requires one addition for every non zero block. …”
Get full text
Get full text
Article -
19
An adaptive face recognition under constrained environment for smartphone database
Published 2018“…Finally, this study aims to obtain high-accuracy face recognition performance under the uncontrolled environment of a smartphone database based on the proposed adaptive face recognition method that combines two new face recognition algorithms. …”
Get full text
Get full text
Thesis -
20
