Search Results - (( data extraction method algorithm ) OR ( data identification method algorithm ))

Refine Results
  1. 1

    Using genetic algorithms as image watermarking performance optimizer / Zuhaili Zahid by Zahid, Zuhaili

    Published 2008
    “…Image watermarking is a method to hide a message in an image for transmission of secret data or identification purposes. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier by Siow, Shien Loong

    Published 2018
    “…There are a lot of feature extraction methods and classification methods for iris classification. …”
    Get full text
    Get full text
    Monograph
  3. 3
  4. 4

    An Ar Natural Marker Similarities Measurement Algorithm For E-Biodiversity by Tan, Mei Synn, Wang, Yin Chai

    Published 2018
    “…Nonetheless, the outcomes of these research are particular in term of the assessed stages of classification conduit, the adopted data for assessments, and in the comparative baseline methods. …”
    Get full text
    Get full text
    Proceeding
  5. 5

    Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali by Mohd Razali, Ainaa Farhanah

    Published 2022
    “…Although there are many feature identification and feature extraction procedures to identify and extract the features on the surfaces based on segmentation methods as presented in previous studies, problem arises when most of them are unable to fulfil the requirements when being implemented on a particular surface topography such as unable to point out at which exact data points the edges features are actually located. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Fingerprint feature extraction based discrete cosine transformation (DCT) by Chin Kim On, Paulraj M. Pandiyan, Sazali Yaacob, Azali Saudi

    Published 2009
    “…The extracted nCT data is used as input for the backpropagation neural network training for personal identification.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  7. 7

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…One of the approaches for structural health monitoring (SHM) consists of two major components, i.e. a network of sensors to collect the response data and an extraction method to obtain information on the structural health condition. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Characterization And Classification Of Bioactive Compound In Natural Products By FTIR And Multivariate Data Analysis by Mohamed Azmin, Nor Fadhillah, Amid, Azura, Asnawi, Ani Liza

    Published 2018
    “…Therefore, this study was focused on the development of algorithm for rapid identification of flavonoids classes which are flavanone, flavone and flavonol. …”
    Get full text
    Get full text
    Monograph
  9. 9

    Autoreclosure in Extra High Voltage Lines using Taguchi’s Method and Optimized Neural Networks by Desta, Zahlay F., K.S., Ramarao, Taj, Mohammed Baloch

    Published 2008
    “…The fault identification prior to reclosing is based on optimized artificial neural network associated with standard Error Back-Propagation, Levenberg Marquardt Algorithm and Resilient Back-Propagation training algorithms together with Taguchi’s Method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Autoreclosure in Extra High Voltage Lines using Taguchi's Method and Optimized Neural Networks by Desta, Zahlay F., K.S., Rama Rao

    Published 2009
    “…The fault identification prior to reclosing is based on optimized artificial neural network associated with standard Error Back-Propagation, Levenberg Marquardt Algorithm and Resilient Back-Propagation training algorithms together with Taguchi’s Method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Application of multivariate data analysis for rapid identification of flavonoids classes by Che Noh, Che Hafizah, Mohamed Azmin, Nor Fadhillah, Amid, Azura, Asnawi, Ani Liza

    Published 2016
    “…Therefore, this study was focused on the development of algorithm for rapid identification of flavonoids classes which are flavanone, flavone and flavonol. …”
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    AR oriented pose matching mechanism from motion capture data by Iqbal J., Sidhu M.S., Ariff M.B.M.

    Published 2023
    “…In order to extract the exact matched pose, the frame sequence is divided into pose feature frame and skeletal data frame by the use of pose matching dance training movement recognition algorithm (PMDTMR). …”
    Article
  13. 13

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…The method employs Semantic Tags Extraction (STSE) algorithm to extract semantic tags of an element and Element Enrichment (EERM) algorithm to enrich the elements. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    A novel discrete wavelet transform-based graphical language classifier for identification of high-impedance fault in distribution power system by Veerasamy, Veerapandiyan, Abdul Wahab, Noor Izzri, Vinayagam, Arangarajan, Othman, Mohammad Lutfi, Ramachandran, Rajeswari, Inbamani, Abinaya, Hizam, Hashim

    Published 2020
    “…Furthermore, the proposed algorithm with LabVIEW facility is more flexible and can be implemented in real time using data acquisition unit for obtaining fault current signal from power system.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Cabbage disease detection system using k-NN algorithm by Mohamad Ainuddin Sahimat

    Published 2022
    “…Finally, the KNN algorithm will be used to classify the disease based on sample nature and a cabbage disease data set. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  16. 16

    Taguchi's method for optimized neural network based autoreclosure in extra high voltage lines by K.S.R., Rao, Z.F., Desta

    Published 2008
    “…The fault identification prior to reclosing is based on optimized artificial neural network associated with Levenberg Marquardt algorithm to train the ANN and Taguchi's Method to find optimal parameters of the algorithm and number of hidden neurons. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Autoreclosure in extra high voltage lines using taguchi's method and optimized neural networks by K.S.R, Rao, F. D., Zahlay

    Published 2008
    “…The fault identification prior to reclosing is based on optimized artificial neural network associated with standard Error Back-Propagation, Levenberg Marquardt Algorithm and Resilient Back-Propagation training algorithms together with Taguchi's Method. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Automated threshold detection for object segmentation in colour image by Akhtaruzzaman, Md., Shafie, Amir Akramin, Khan, Md. Raisuddin

    Published 2016
    “…Most common solution of the task is the uses of threshold strategy based on trial and error method. As the method is not automated, it is time consuming and sometimes a single threshold value does not work for a series of image frames of video data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Video image processing for traffic analysis by Che Puan, Othman

    Published 1992
    “…This tape is typical of tapes from which data have been extracted manually using event recorders. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN by SARI, YUNITA SARI

    Published 2011
    “…The algorithm is utilized for predicting a huge set of unlabeled data, given a small number of labelled data. …”
    Get full text
    Get full text
    Thesis