Search Results - (( data identification using algorithm ) OR ( pattern extraction method algorithm ))
Search alternatives:
- identification using »
- data identification »
- pattern extraction »
- extraction method »
- method algorithm »
- using algorithm »
-
1
Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier
Published 2018“…Classic local binary pattern (LBP) is one of the most useful feature extraction methods. …”
Get full text
Get full text
Monograph -
2
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
Get full text
Get full text
Get full text
Thesis -
3
APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN
Published 2011“…In our research, extraction pattern from the first module will be fed to this algorithm and is used to make the prediction of named entity candidate category. …”
Get full text
Get full text
Thesis -
4
Cabbage disease detection system using k-NN algorithm
Published 2022“…Finally, the KNN algorithm will be used to classify the disease based on sample nature and a cabbage disease data set. …”
Get full text
Get full text
Get full text
Academic Exercise -
5
Investigating optimal smartphone placement for identifying stairs movement using machine learning
Published 2023“…The data was trained against 6 machine learning algorithms namely Decision Tree, Logistic Regression, Naive Bayes, Random Forest, Neural Networks and KNN. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
EEG Eye State Identification based on Statistical Feature and Common Spatial Pattern Filter
Published 2019Get full text
Get full text
Conference or Workshop Item -
7
EEG Eye State Identification based on Statistical Feature and Common Spatial Pattern Filter
Published 2019Get full text
Get full text
Conference or Workshop Item -
8
Analytical method for forensic investigation of social networking applications on smartphones
Published 2016“…Moreover, an algorithm was designed that automatically extracts social networking data remnants from smartphones using the identified patterns. …”
Get full text
Get full text
Get full text
Thesis -
9
Plant recognition based on identification of leaf image using image processing / Nor Silawati Sha’ari
Published 2018Get full text
Get full text
Student Project -
10
Analysis of Traffic Accident Patterns Using Association Rule Mining
Published 2024“…The application of the apriori algorithm facilitated the identification of frequent itemsets and rules that reveal patterns across accident variables, such as road conditions, road functions, accident types, weather conditions, and victim statuses. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…The Speeded-Up Robust Features (SURF) Algorithms is used to determine the interest points. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Finger-Vein Biometric Identification Using Convolutional Neural Network
Published 2016“…A novel approach using a convolutional neural network (CNN) for finger-vein biometric identification is presented in this paper. …”
Get full text
Get full text
Get full text
Article -
13
A New Intelligent Autoreclosing Scheme Using Artificial Neural Network and Taguchi's Methodology
Published 2010“…A variety of fault simulations are carried out on a specified transmission line on the standard IEEE 9-bus electric power system using MATLAB/SimPowerSytems. FFT and Prony analysis methods are employed to extract data features from each simulated fault. …”
Get full text
Get full text
Article -
14
Deep plant: A deep learning approach for plant classification / Lee Sue Han
Published 2018“…They look for the procedures or algorithms that maximize the use of leaf databases for plant predictive modelling, but this results in leaf features which are liable to change with different leaf data and feature extraction techniques. …”
Get full text
Get full text
Get full text
Thesis -
15
A New Intelligent Autoreclosing Scheme Using Artificial Neural Network and Taguchi’s Methodology
Published 2011“…A variety of fault simulations are carried out on a specified transmission line on the standard IEEE 9-bus electric power system using MATLAB/SimPowerSytems. FFT and Prony analysis methods are employed to extract data features from each simulated fault. …”
Get full text
Get full text
Article -
16
Data fusion and multiple classifier systems for human activity detection and health monitoring: Review and open research directions
Published 2019“…These sensors are pre-processed and different feature sets such as time domain, frequency domain, wavelet transform are extracted and transform using machine learning algorithm for human activity classification and monitoring. …”
Get full text
Get full text
Article -
17
A New Swarm-Based Framework for Handwritten Authorship Identification in Forensic Document Analysis
Published 2014“…This chapter instead focuses on identifying the unique individual significant features of word shape by using feature selection method prior the identification task. …”
Get full text
Get full text
Book Chapter -
18
A new swarm-based framework for handwritten authorship identification in forensic document analysis
Published 2014“…This chapter instead focuses on identifying the unique individual significant features of word shape by using feature selection method prior the identification task. …”
Get full text
Get full text
Book Chapter -
19
Evaluating the effect of viewing angle in different conditions for gait recognition
Published 2017“…The results show that the proposed method outperforms the other existing methods & puts a decent fight to the base algorithm.…”
Get full text
Get full text
Get full text
Get full text
Article -
20
Investigation of dimensionality reduction in a finger vein verification system
Published 2018“…The vein pattern was extracted using repeated line tracking and dimensionality reduction using principal components analysis to generate the feature vector. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
