Search Results - (( data identification using algorithm ) OR ( pattern extraction method algorithm ))

Refine Results
  1. 1

    Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier by Siow, Shien Loong

    Published 2018
    “…Classic local binary pattern (LBP) is one of the most useful feature extraction methods. …”
    Get full text
    Get full text
    Monograph
  2. 2

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN by SARI, YUNITA SARI

    Published 2011
    “…In our research, extraction pattern from the first module will be fed to this algorithm and is used to make the prediction of named entity candidate category. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Cabbage disease detection system using k-NN algorithm by Mohamad Ainuddin Sahimat

    Published 2022
    “…Finally, the KNN algorithm will be used to classify the disease based on sample nature and a cabbage disease data set. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  5. 5

    Investigating optimal smartphone placement for identifying stairs movement using machine learning by Muhammad Ruhul Amin, Shourov, Husman, Muhammad Afif, Toha, Siti Fauziah, Jasni, Farahiyah

    Published 2023
    “…The data was trained against 6 machine learning algorithms namely Decision Tree, Logistic Regression, Naive Bayes, Random Forest, Neural Networks and KNN. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8

    Analytical method for forensic investigation of social networking applications on smartphones by Dezfouli, Farhood Norouzizadeh

    Published 2016
    “…Moreover, an algorithm was designed that automatically extracts social networking data remnants from smartphones using the identified patterns. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Analysis of Traffic Accident Patterns Using Association Rule Mining by Yudy, Pranata, Tri Basuki, Kurniawan, Edi Surya, Negara, Ahmad Haidar, Mirza

    Published 2024
    “…The application of the apriori algorithm facilitated the identification of frequent itemsets and rules that reveal patterns across accident variables, such as road conditions, road functions, accident types, weather conditions, and victim statuses. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching by Ei Wei., Ting, M. Z., Ibrahim, D.J., Mulvaney

    Published 2017
    “…The Speeded-Up Robust Features (SURF) Algorithms is used to determine the interest points. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Finger-Vein Biometric Identification Using Convolutional Neural Network by Syafeeza, Ahmad Radzi, Mohamed, Khalil-Hani, Rabia, Bakhteri

    Published 2016
    “…A novel approach using a convolutional neural network (CNN) for finger-vein biometric identification is presented in this paper. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    A New Intelligent Autoreclosing Scheme Using Artificial Neural Network and Taguchi's Methodology by K.S.R., Rao, Fitiwi, Desta Zahlay, Ibrahim, Taib

    Published 2010
    “…A variety of fault simulations are carried out on a specified transmission line on the standard IEEE 9-bus electric power system using MATLAB/SimPowerSytems. FFT and Prony analysis methods are employed to extract data features from each simulated fault. …”
    Get full text
    Get full text
    Article
  14. 14

    Deep plant: A deep learning approach for plant classification / Lee Sue Han by Lee , Sue Han

    Published 2018
    “…They look for the procedures or algorithms that maximize the use of leaf databases for plant predictive modelling, but this results in leaf features which are liable to change with different leaf data and feature extraction techniques. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    A New Intelligent Autoreclosing Scheme Using Artificial Neural Network and Taguchi’s Methodology by Fitiwi, Desta Zahlay, K. S., Rama Rao, Taib , Ibrahim

    Published 2011
    “…A variety of fault simulations are carried out on a specified transmission line on the standard IEEE 9-bus electric power system using MATLAB/SimPowerSytems. FFT and Prony analysis methods are employed to extract data features from each simulated fault. …”
    Get full text
    Get full text
    Article
  16. 16

    Data fusion and multiple classifier systems for human activity detection and health monitoring: Review and open research directions by Nweke, Henry Friday, Teh, Ying Wah, Mujtaba, Ghulam, Al-Garadi, Mohammed Ali

    Published 2019
    “…These sensors are pre-processed and different feature sets such as time domain, frequency domain, wavelet transform are extracted and transform using machine learning algorithm for human activity classification and monitoring. …”
    Get full text
    Get full text
    Article
  17. 17

    A New Swarm-Based Framework for Handwritten Authorship Identification in Forensic Document Analysis by Draman @ Muda, Azah Kamilah, Choo, Yun Huoy, Draman @ Muda, Noor Azilah

    Published 2014
    “…This chapter instead focuses on identifying the unique individual significant features of word shape by using feature selection method prior the identification task. …”
    Get full text
    Get full text
    Book Chapter
  18. 18

    A new swarm-based framework for handwritten authorship identification in forensic document analysis by Pratama, Satrya Fajri, Draman @ Muda, Azah Kamilah, Choo, Yun Huoy, Draman @ Muda, Noor Azilah

    Published 2014
    “…This chapter instead focuses on identifying the unique individual significant features of word shape by using feature selection method prior the identification task. …”
    Get full text
    Get full text
    Book Chapter
  19. 19

    Evaluating the effect of viewing angle in different conditions for gait recognition by Makhdoomi, Nahid Ameer, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2017
    “…The results show that the proposed method outperforms the other existing methods & puts a decent fight to the base algorithm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Investigation of dimensionality reduction in a finger vein verification system by Ting, Ei Wei, M. Z., Ibrahim, Mulvaney, D. J.

    Published 2018
    “…The vein pattern was extracted using repeated line tracking and dimensionality reduction using principal components analysis to generate the feature vector. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item