Search Results - (( data extraction method algorithm ) OR ( data normalization _ algorithm ))

Refine Results
  1. 1

    Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier by Siow, Shien Loong

    Published 2018
    “…Firstly, the 1D-LBP algorithm is used to extract the features of the normalized iris images and save the data in a text file according to the subject and the combinations to evaluate for the next stage. …”
    Get full text
    Get full text
    Monograph
  2. 2

    An efficient algorithm for cardiac arrhythmia classification using ensemble of depthwise Separable convolutional neural networks by Ihsanto, Eko, Ramli, Kalamullah, Sudiana, Dodi, Gunawan, Teddy Surya

    Published 2020
    “…In the training phase, around 22% of the 110,057 beats data extracted from 48 records were utilized. Using only these 22% labeled training data, our proposed algorithm was able to classify the remaining 78% of the database into 16 classes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Time normalization of LPC feature using warping method by Sudirman, Rubita, Salleh, Sh. Hussain, Khalid, Puspa Inayat, Ahmad, Abd. Hamid

    Published 2005
    “…Another task is to align the input frames (test set) to the reference template (training set) using DTW fixing frame (DTW-FF) algorithm. This proper time normalization is needed since NN is designed to compare data of the same length whilst same speech can varies in their length. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Autoreclosure in Extra High Voltage Lines using Taguchi’s Method and Optimized Neural Networks by Desta, Zahlay F., K.S., Ramarao, Taj, Mohammed Baloch

    Published 2008
    “…The developed algorithm is effectively trained, verified and validated with a set of training, dedicated testing and validation data respectively.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Autoreclosure in Extra High Voltage Lines using Taguchi's Method and Optimized Neural Networks by Desta, Zahlay F., K.S., Rama Rao

    Published 2009
    “…The algorithms are developed using MATLAB software. A range of faults are simulated on EHV modeled transmission line using SimPowerSytems, and the spectra of the fault data are analyzed using fast Fourier transform to extract features of each type of fault. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Frequent Lexicographic Algorithm for Mining Association Rules by Mustapha, Norwati

    Published 2005
    “…The concept of data mining has brought the attention of business community in finding techniques that can extract nontrivial, implicit, previously unknown and potentially useful information from databases. …”
    Get full text
    Get full text
    Thesis
  8. 8

    An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs by Sadiq, Ali Safaa, Alkazemi, Basem, Mirjalili, Seyedali, Ahmed, Noraziah, Khan, Suleman, Ali, Ihsan, Pathan, Al-Sakib Khan, Ghafoor, Kayhan Zrar

    Published 2018
    “…In order to improve the effectiveness of intrusion detection systems (IDSs), data analysis methods such as data mining and classification methods are often integrated with IDSs. …”
    Get full text
    Get full text
    Article
  9. 9

    An efficient IDS using hybrid Magnetic swarm optimization in WANETs by Sadiq, Ali Safa, Alkazemi, Basem Y., Mirjalili, Seyedali, Noraziah, Ahmad, Khan, Suleman, Ihsan, Ali, Pathan, Al-Sakib Khan, Ghafoor, Kayhan Zrar

    Published 2018
    “…In order to improve the effectiveness of intrusion detection systems (IDSs), data analysis methods such as data mining and classification methods are often integrated with IDSs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Taguchi's method for optimized neural network based autoreclosure in extra high voltage lines by K.S.R., Rao, Z.F., Desta

    Published 2008
    “…The developed algorithm is verified with dedicated testing data. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    An improved method in speech signal input representation based on DTW technique for NN speech recognition system by Sudirman, Rubita, Salleh, Sh. Hussain, Salleh, Shaharuddin

    Published 2007
    “…This frame normalization is required since NN is designed to compare data of the same length, however same speech varies in their length most of the time. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Autoreclosure in extra high voltage lines using taguchi's method and optimized neural networks by K.S.R, Rao, F. D., Zahlay

    Published 2008
    “…The developed algorithm is effectively trained, verified and validated with a set of training, dedicated testing and validation data respectively. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Shape-based recognition using combined Jaccard and Mahalanobis measurement / Noor Aznimah Abdul Aziz by Abdul Aziz, Noor Aznimah

    Published 2013
    “…The new combined algorithm also implements edges separation and masking technique to improve similarity measurement and reduce the amount of testing data set used. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    CAT CHAOTIC GENETIC ALGORITHM BASED TECHNIQUE AND HARDWARE PROTOTYPE FOR SHORT TERM ELECTRICAL LOAD FORECASTING by ISLAM, BADAR UL ISLAM

    Published 2017
    “…The proposed model is tested for small and large size grid data, integrated with photovoltaic sources under normal and fluctuating load demand conditions and seasonal variations. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Voting algorithms for large scale fault-tolerant systems by Karimi, Abbas

    Published 2011
    “…By extracting various plots from different aspects, we demonstrated that, compared to the basic algorithm, our algorithm has higher reliability and availability as the quantity of the input data increases. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Removal of BCG artefact from concurrent fMRI-EEG recordings based on EMD and PCA by Javed, E., Faye, I., Malik, A.S., Abdullah, J.M.

    Published 2017
    “…From the simulated data, the similarity index between the extracted BCG and the simulated BCG showed the effectiveness of the proposed method in BCG removal. …”
    Get full text
    Get full text
    Article