Search Results - (( data identification based algorithm ) OR ( data extraction method algorithm ))

Refine Results
  1. 1

    Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali by Mohd Razali, Ainaa Farhanah

    Published 2022
    “…Although there are many feature identification and feature extraction procedures to identify and extract the features on the surfaces based on segmentation methods as presented in previous studies, problem arises when most of them are unable to fulfil the requirements when being implemented on a particular surface topography such as unable to point out at which exact data points the edges features are actually located. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Fingerprint feature extraction based discrete cosine transformation (DCT) by Chin Kim On, Paulraj M. Pandiyan, Sazali Yaacob, Azali Saudi

    Published 2009
    “…The extracted nCT data is used as input for the backpropagation neural network training for personal identification.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  4. 4

    Using genetic algorithms as image watermarking performance optimizer / Zuhaili Zahid by Zahid, Zuhaili

    Published 2008
    “…Image watermarking is a method to hide a message in an image for transmission of secret data or identification purposes. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier by Siow, Shien Loong

    Published 2018
    “…Firstly, the 1D-LBP algorithm is used to extract the features of the normalized iris images and save the data in a text file according to the subject and the combinations to evaluate for the next stage. …”
    Get full text
    Get full text
    Monograph
  6. 6

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…Data mining (DM) is a novel data extraction technology which can employ for development of inverse analysis. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    A novel discrete wavelet transform-based graphical language classifier for identification of high-impedance fault in distribution power system by Veerasamy, Veerapandiyan, Abdul Wahab, Noor Izzri, Vinayagam, Arangarajan, Othman, Mohammad Lutfi, Ramachandran, Rajeswari, Inbamani, Abinaya, Hizam, Hashim

    Published 2020
    “…This paper proposes a discrete wavelet transform (DWT)-based Graphical Language classifier algorithm for identification of high-impedance fault (HIF) in medium voltage (MV) distribution network of 13.8 kV. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    An Ar Natural Marker Similarities Measurement Algorithm For E-Biodiversity by Tan, Mei Synn, Wang, Yin Chai

    Published 2018
    “…Nonetheless, the outcomes of these research are particular in term of the assessed stages of classification conduit, the adopted data for assessments, and in the comparative baseline methods. …”
    Get full text
    Get full text
    Proceeding
  9. 9

    Characterization And Classification Of Bioactive Compound In Natural Products By FTIR And Multivariate Data Analysis by Mohamed Azmin, Nor Fadhillah, Amid, Azura, Asnawi, Ani Liza

    Published 2018
    “…Therefore, this study was focused on the development of algorithm for rapid identification of flavonoids classes which are flavanone, flavone and flavonol. …”
    Get full text
    Get full text
    Monograph
  10. 10

    Application of multivariate data analysis for rapid identification of flavonoids classes by Che Noh, Che Hafizah, Mohamed Azmin, Nor Fadhillah, Amid, Azura, Asnawi, Ani Liza

    Published 2016
    “…Therefore, this study was focused on the development of algorithm for rapid identification of flavonoids classes which are flavanone, flavone and flavonol. …”
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    AR oriented pose matching mechanism from motion capture data by Iqbal J., Sidhu M.S., Ariff M.B.M.

    Published 2023
    “…In order to extract the exact matched pose, the frame sequence is divided into pose feature frame and skeletal data frame by the use of pose matching dance training movement recognition algorithm (PMDTMR). …”
    Article
  12. 12

    Taguchi's method for optimized neural network based autoreclosure in extra high voltage lines by K.S.R., Rao, Z.F., Desta

    Published 2008
    “…The fault identification prior to reclosing is based on optimized artificial neural network associated with Levenberg Marquardt algorithm to train the ANN and Taguchi's Method to find optimal parameters of the algorithm and number of hidden neurons. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Autoreclosure in Extra High Voltage Lines using Taguchi’s Method and Optimized Neural Networks by Desta, Zahlay F., K.S., Ramarao, Taj, Mohammed Baloch

    Published 2008
    “…The fault identification prior to reclosing is based on optimized artificial neural network associated with standard Error Back-Propagation, Levenberg Marquardt Algorithm and Resilient Back-Propagation training algorithms together with Taguchi’s Method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Autoreclosure in Extra High Voltage Lines using Taguchi's Method and Optimized Neural Networks by Desta, Zahlay F., K.S., Rama Rao

    Published 2009
    “…The fault identification prior to reclosing is based on optimized artificial neural network associated with standard Error Back-Propagation, Levenberg Marquardt Algorithm and Resilient Back-Propagation training algorithms together with Taguchi’s Method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Video image processing for traffic analysis by Che Puan, Othman

    Published 1992
    “…This tape is typical of tapes from which data have been extracted manually using event recorders. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…The method employs Semantic Tags Extraction (STSE) algorithm to extract semantic tags of an element and Element Enrichment (EERM) algorithm to enrich the elements. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    CAT CHAOTIC GENETIC ALGORITHM BASED TECHNIQUE AND HARDWARE PROTOTYPE FOR SHORT TERM ELECTRICAL LOAD FORECASTING by ISLAM, BADAR UL ISLAM

    Published 2017
    “…The solution set (i.e. optimized weight/bias matrix of ANN) provided by the optimized and improved genetic algorithm and modified BP based model is extracted and used in the design and development of a prototype device of the proposed model. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Cabbage disease detection system using k-NN algorithm by Mohamad Ainuddin Sahimat

    Published 2022
    “…Finally, the KNN algorithm will be used to classify the disease based on sample nature and a cabbage disease data set. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  19. 19

    GA optimization-based BRB AI reasoning algorithm for determining the factors affecting customer churn for operators by Kun, Liu, Alli, Hassan, Abd Rahman, Khairul Aidil Azlin

    Published 2024
    “…In the era of big data, numerous predictive models are based on more redundant features, which increases the complexity of the algorithms and the difficulty of analyzing customer churn. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Automated threshold detection for object segmentation in colour image by Akhtaruzzaman, Md., Shafie, Amir Akramin, Khan, Md. Raisuddin

    Published 2016
    “…Most common solution of the task is the uses of threshold strategy based on trial and error method. As the method is not automated, it is time consuming and sometimes a single threshold value does not work for a series of image frames of video data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article