Search Results - (( based evaluation based algorithm ) OR ( text classification matching algorithm ))

Refine Results
  1. 1

    Non-fiducial based electrocardiogram biometrics with kernel methods by Hejazi, Maryamsadat

    Published 2017
    “…The effectiveness of this algorithm is investigated by comparing with other AC based feature extraction algorithms involving AC/LDA (Linear Discriminant Analysis) and AC/PCA (Principal Component Analysis). …”
    Get full text
    Get full text
    Thesis
  2. 2

    An Ar Natural Marker Similarities Measurement Algorithm For E-Biodiversity by Tan, Mei Synn, Wang, Yin Chai

    Published 2018
    “…The objective of this research is to comparatively evaluate the effectiveness of different algorithms, method combination procedure, and their parameters towards classification accuracy. …”
    Get full text
    Get full text
    Proceeding
  3. 3

    A new hybrid technique for nosologic segmentation of primary brain tumors / Shafaf Ibrahim by Ibrahim, Shafaf

    Published 2015
    “…For this purpose, an algorithm which hybridized the Intensity Based Analysis (IBA), Grey Level Co-occurrence Matrices (GLCM), Adaptive Network-based Fuzzy Inference System (ANFIS) and £article ~warm Optimization (PSO) Clustering Algorithm (CAPSOCA) is proposed. …”
    Get full text
    Get full text
    Thesis
  4. 4

    An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding by Safa, Soodabeh, Khalid, Fatimah

    Published 2020
    “…Classic bag of visual words algorithm is based on k-means clustering and every SIFT features belongs to one cluster and it leads to decreasing classification results. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Optimized image enhancement of colour processing for retinal fundus image by Nurul Atikah, Mohd Sharif

    Published 2025
    “…This approach aims to improve optimization by balancing exploration and exploitation and refining velocity control. The proposed algorithm underwent both qualitative and quantitative evaluations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Optimized image enhancement of colour processing for retinal fundus image by Nurul Atikah, Mohd Sharif

    Published 2025
    “…This approach aims to improve optimization by balancing exploration and exploitation and refining velocity control. The proposed algorithm underwent both qualitative and quantitative evaluations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms by Bakar, Abubakar Diwani

    Published 2016
    “…The latest effort to solve this selection problem is the development of the metrics selection model that uses genetic algorithm (GA). However, the process failed to state clearly the encoding strategy in its initial stage. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Predicting Cheaters in PlayerUnknown’s Battlegrounds (PUBG) using Random Forest Algorithm by Nurin Alya, Haris

    Published 2023
    “…The primary goal is to use the Random Forest algorithm, an effective machine learning technique, to predict instances of cheating based on the behavioural patterns of participants. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  11. 11
  12. 12
  13. 13
  14. 14

    Identification of Quran recitation segment from speech video recording / Liliana Nulkasim @ Mohd Kassim by Nulkasim @ Mohd Kassim, Liliana

    Published 2017
    “…A random forest classifier algorithm is employed in Spyder IDE using python language as a machine learning language for predict the type of an audio. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

    Biometric identification and recognition for iris using failure rejection rate (FRR) / Musab A. M. Ali by M. Ali, Musab A.

    Published 2016
    “…At any process of recognition stage, the biometric data is protected and also whenever there is a compromise to any information in the database it will be on the cancelable biometric template merely without affecting the original biometric information. In order to evaluate and verify the effectiveness of the proposed technique, CASIA-A (version 3.1) and Bath-A iris databases have been selected for performance testing. …”
    Get full text
    Get full text
    Thesis