Search Results - (( data identification method algorithm ) OR ( data extraction method algorithm ))
Search alternatives:
- identification method »
- data identification »
- extraction method »
- method algorithm »
-
1
Using genetic algorithms as image watermarking performance optimizer / Zuhaili Zahid
Published 2008“…Image watermarking is a method to hide a message in an image for transmission of secret data or identification purposes. …”
Get full text
Get full text
Thesis -
2
Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier
Published 2018“…There are a lot of feature extraction methods and classification methods for iris classification. …”
Get full text
Get full text
Monograph -
3
Data mining in mobile ECG based biometric identification
Published 2014Get full text
Get full text
Get full text
Article -
4
An Ar Natural Marker Similarities Measurement Algorithm For E-Biodiversity
Published 2018“…Nonetheless, the outcomes of these research are particular in term of the assessed stages of classification conduit, the adopted data for assessments, and in the comparative baseline methods. …”
Get full text
Get full text
Proceeding -
5
Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali
Published 2022“…Although there are many feature identification and feature extraction procedures to identify and extract the features on the surfaces based on segmentation methods as presented in previous studies, problem arises when most of them are unable to fulfil the requirements when being implemented on a particular surface topography such as unable to point out at which exact data points the edges features are actually located. …”
Get full text
Get full text
Thesis -
6
Fingerprint feature extraction based discrete cosine transformation (DCT)
Published 2009“…The extracted nCT data is used as input for the backpropagation neural network training for personal identification.…”
Get full text
Get full text
Get full text
Get full text
Proceedings -
7
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…One of the approaches for structural health monitoring (SHM) consists of two major components, i.e. a network of sensors to collect the response data and an extraction method to obtain information on the structural health condition. …”
Get full text
Get full text
Get full text
Thesis -
8
Characterization And Classification Of Bioactive Compound In Natural Products By FTIR And Multivariate Data Analysis
Published 2018“…Therefore, this study was focused on the development of algorithm for rapid identification of flavonoids classes which are flavanone, flavone and flavonol. …”
Get full text
Get full text
Monograph -
9
Autoreclosure in Extra High Voltage Lines using Taguchi’s Method and Optimized Neural Networks
Published 2008“…The fault identification prior to reclosing is based on optimized artificial neural network associated with standard Error Back-Propagation, Levenberg Marquardt Algorithm and Resilient Back-Propagation training algorithms together with Taguchi’s Method. …”
Get full text
Get full text
Conference or Workshop Item -
10
Autoreclosure in Extra High Voltage Lines using Taguchi's Method and Optimized Neural Networks
Published 2009“…The fault identification prior to reclosing is based on optimized artificial neural network associated with standard Error Back-Propagation, Levenberg Marquardt Algorithm and Resilient Back-Propagation training algorithms together with Taguchi’s Method. …”
Get full text
Get full text
Conference or Workshop Item -
11
Application of multivariate data analysis for rapid identification of flavonoids classes
Published 2016“…Therefore, this study was focused on the development of algorithm for rapid identification of flavonoids classes which are flavanone, flavone and flavonol. …”
Get full text
Get full text
Proceeding Paper -
12
AR oriented pose matching mechanism from motion capture data
Published 2023“…In order to extract the exact matched pose, the frame sequence is divided into pose feature frame and skeletal data frame by the use of pose matching dance training movement recognition algorithm (PMDTMR). …”
Article -
13
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…The method employs Semantic Tags Extraction (STSE) algorithm to extract semantic tags of an element and Element Enrichment (EERM) algorithm to enrich the elements. …”
Get full text
Get full text
Get full text
Thesis -
14
A novel discrete wavelet transform-based graphical language classifier for identification of high-impedance fault in distribution power system
Published 2020“…Furthermore, the proposed algorithm with LabVIEW facility is more flexible and can be implemented in real time using data acquisition unit for obtaining fault current signal from power system.…”
Get full text
Get full text
Get full text
Article -
15
Cabbage disease detection system using k-NN algorithm
Published 2022“…Finally, the KNN algorithm will be used to classify the disease based on sample nature and a cabbage disease data set. …”
Get full text
Get full text
Get full text
Academic Exercise -
16
Taguchi's method for optimized neural network based autoreclosure in extra high voltage lines
Published 2008“…The fault identification prior to reclosing is based on optimized artificial neural network associated with Levenberg Marquardt algorithm to train the ANN and Taguchi's Method to find optimal parameters of the algorithm and number of hidden neurons. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Autoreclosure in extra high voltage lines using taguchi's method and optimized neural networks
Published 2008“…The fault identification prior to reclosing is based on optimized artificial neural network associated with standard Error Back-Propagation, Levenberg Marquardt Algorithm and Resilient Back-Propagation training algorithms together with Taguchi's Method. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Automated threshold detection for object segmentation in colour image
Published 2016“…Most common solution of the task is the uses of threshold strategy based on trial and error method. As the method is not automated, it is time consuming and sometimes a single threshold value does not work for a series of image frames of video data. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Video image processing for traffic analysis
Published 1992“…This tape is typical of tapes from which data have been extracted manually using event recorders. …”
Get full text
Get full text
Get full text
Article -
20
APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN
Published 2011“…The algorithm is utilized for predicting a huge set of unlabeled data, given a small number of labelled data. …”
Get full text
Get full text
Thesis
