Search Results - (( co extraction ((bat algorithm) OR (_ algorithm)) ) OR ( data implementation using algorithmic ))
Search alternatives:
- implementation using »
- data implementation »
- co extraction »
- bat algorithm »
- algorithmic »
-
1
Non-invasive gliomas grading using swarm intelligence algorithm / Muhammad Harith Ramli
Published 2017“…Bat algorithm is chosen for the development of the prototype for segmentation and classification purpose. …”
Get full text
Get full text
Thesis -
2
Engine fault diagnosis using probabilistic neural network
Published 2021“…A benchmarked engine fault model is developed and simulated in Maltab. The proposed algorithm is designed to detect 9 common engine faults based on the information extracted from exhaust gas, such as hydrocarbon (HC), carbon monoxide (CO), oxides of nitrogen (NOx), carbon dioxide (CO2) and dioxygen (O2). …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
3
Internet of Things (IoT) based activity recognition strategies in smart homes: a review
Published 2022“…In this work, we focus our review on activity recognition implementation strategies by examining various sensors and sensing technologies used to collect useful data from IoT devices, reviewing preprocessing and feature extraction techniques, as well as classification algorithms used to recognize human activities in smart homes. …”
Get full text
Get full text
Article -
4
Features Extraction of Arabic Calligraphy using extended Triangle Model for Digital Jawi Paleography Analysis
Published 2013“…For validation of proposed algorithm, 60,000:20,000 training and testing data from Hoda digit dataset has been prepared, selected randomly for 10 rounds of testing. …”
Get full text
Get full text
Article -
5
Intelligent Thermal Condition Monitoring Of Electrical Equipment Using Infrared Thermography
Published 2013“…The multilayered perceptron neural networks are trained using various training algorithms. Additionally, the present research introduces a computer aided defect diagnosis system where the defected region is found by manual thresholding and intensity features are extracted from each segmented region. …”
Get full text
Get full text
Thesis -
6
The discovery of Top-K DNA frequent patterns with approximate method / Nittaya Kerdprasop and Kittisak Kerdprasop
Published 2014“…Our designed algorithm had been implemented with the Erlang language, which is the functional programming paradigm with inherent support for pattern matching. …”
Get full text
Get full text
Get full text
Article -
7
Feature extraction and localisation using scale-invariant feature transform on 2.5D image
Published 2015“…In this paper, we present and discuss our new automatic landmarking method on face data using 2.5-dimensional (2.5D) range images. …”
Get full text
Get full text
Get full text
Article -
8
Face detection system design for real time high resolution smart camera
Published 2009“…For filter stage, the algorithm is designed to be very fast so that it can be processed in real time. …”
Get full text
Get full text
Get full text
Proceeding Paper -
9
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. …”
Get full text
Get full text
Monograph -
10
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
11
Attribute related methods for improvement of ID3 Algorithm in classification of data: A review
Published 2020“…There are several learning algorithms to implement the decision tree but the most commonly-used is ID3 algorithm. …”
Get full text
Get full text
Get full text
Article -
12
-
13
-
14
Modelling semantic context for novelty detection in wildlife scenes
Published 2010“…Working with wildlife image data, the framework starts with image segmentation, followed by feature extraction and classification of the image blocks extracted from image segments. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Analysis of minutia extraction techniques in fingerprint recognition.
Published 2012Get full text
Working Paper -
16
Jogging activity recognition using k-NN algorithm
Published 2022“…The k-NN algorithm is a simple and easy-to-implement supervised machine learning algorithm that can be used to solve both classification and regression problems. …”
Get full text
Get full text
Get full text
Academic Exercise -
17
DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE
Published 2019“…The RIPEMD-160 can improve the security in storing information. This project used iterative method to investigate the security algorithm and implemented the algorithm. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
18
A web-based implementation of k-means algorithms
Published 2022“…The K-means algorithm has been around for over a century. While a rather simplistic and dated algorithm, it remains widely used and taught till this day. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
DESIGN AND IMPLEMENTATION OF RIPEMD-160 HASH FUNCTION USING VERILOG HDL
Published 2022“…It is implemented using Verilog HDL software and simulated using the ModelSim software. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
20
