Search Results - (( data identification using algorithm ) OR ( code classification methods algorithm ))

Refine Results
  1. 1

    An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding by Safa, Soodabeh, Khalid, Fatimah

    Published 2020
    “…Performance of proposed methods surpass the classic bag of words algorithm for plant identification tasks.…”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…In this method, features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2015
    “…In this method, permission-based features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Biometric identification and recognition for iris using failure rejection rate (FRR) / Musab A. M. Ali by M. Ali, Musab A.

    Published 2016
    “…The subsequent step is using the DAUB3 wavelet transform for feature extraction along with the application of an additional step for biometric template security that is the Non-invertible transform (cancelable biometrics method) and finally utilizing the Support Vector Machine (Non-linear Quadratic kernel) for matching/classification. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Chain coding and pre processing stages of handwritten character image file by Suliman, Azizah, Sulaiman, Md. Nasir, Othman, Mohamed, O. K. Rahmat, Rahmita Wirza

    Published 2010
    “…Each of the pre-processing stages and the chain coding process will be described in detail giving improvised algorithms, and examples of the processes on existing samples from the database shown. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Crow Search Freeman Chain Code (CS-FCC) feature extraction algorithm for handwritten character recognition by Muhammad Arif, Mohamad, Zalili, Musa, Amelia Ritahani, Ismail

    Published 2023
    “…With so many algorithms developed to improve classification accuracy, interest in feature extraction in Handwritten Character Recognition (HCR) has increased. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    Improving hand written digit recognition using hybrid feature selection algorithm by Wong, Khye Mun

    Published 2022
    “…The hybrid method was exemplified in a binary classification between digits ‘4’ and ‘9’ from a multiple features dataset. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning by Safa, Soodabeh

    Published 2016
    “…Moreover, instead of concatenating feature vectors together and send to classifier, sparse coding and dictionary learning methods are used and instead of considering all features as one view (visual feature), K-SVD algorithm that is one of the famous algorithms for sparse representation is optimized and developed to multi-view model.The experimental results prove that the proposed methods has improved accuracy by 53.77% compared to concatenating features and classic K-SVD dictionary learning model as well.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Cross-project software defect prediction by Bala, Yahaya Zakariyau, Abdul Samat, Pathiah, Sharif, Khaironi Yatim, Manshor, Noridayu

    Published 2022
    “…Through this work, it was discovered the majority of the selected studies used machine learning techniques as classification algorithms, and 64% of the studies used the combination of Object-Oriented (OO) and Line of Code (LOC) metrics. …”
    Get full text
    Get full text
    Article
  12. 12

    Date store management in sliding window based on-line identification algorithms by Asirvadam , Vijanth Sagayan, McLoone, Sean, Irwin, George W

    Published 2001
    “…Sliding window identification algorithms use information from a store of data to optimise on-line learning. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    Hybrid DE-PEM algorithm for identification of UAV helicopter by Tijani, Ismaila, Akmeliawati, Rini, Legowo, Ari, Budiyono, Agus, Abdul Muthalif, Asan Gani

    Published 2014
    “…Design/methodology/approach – In this study, flight data were collected and analyzed; MATLAB-based system identification algorithm was developed using DE and PEM; parameterized state-space model parameters were estimated using the developed algorithm and model dynamic analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    System identification using Extended Kalman Filter by Alias, Ahmad Hafizi

    Published 2017
    “…Besides, Extended Kalman Filter (EKF) algorithm was selected in this project as an algorithm for offline estimation data purposes. …”
    Get full text
    Get full text
    Student Project
  16. 16
  17. 17
  18. 18

    Data mining based damage identification using imperialist competitive algorithm and artificial neural network by Gordan, Meisam, Razak, Hashim Abdul, Ismail, Zubaidah, Ghaedi, Khaled

    Published 2018
    “…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Missing tags detection algorithm for radio frequency identification (RFID) data stream by Zainudin, Nur 'Aifaa

    Published 2019
    “…AC complement algorithm was used to compare the different in each set of data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis