Search Results - (( data verification using algorithm ) OR ( (variable OR variables) extractions method algorithm ))

Refine Results
  1. 1

    Coronary artery stenosis detection and visualization / Tang Sze Ling by Tang, Sze Ling

    Published 2015
    “…The proposed method benchmarked with the state-of-the-art methods and achieved comparable results. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    Long-term electrical energy consumption: Formulating and forecasting via optimized gene expression programming / Seyed Hamidreza Aghay Kaboli by Seyed Hamidreza , Aghay Kaboli

    Published 2018
    “…In the developed feature selection approach, multi-objective binary-valued backtracking search algorithm (MOBBSA) is used as an efficient evolutionary search algorithm to search within different combinations of input variables and selects the non-dominated feature subsets, which minimize simultaneously both the estimation error and the number of features. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Optimizing timber transportation planning for timber harvesting using bees algorithm in Malaysia by Jamaluddin, Jamhuri, Kamarudin, Norizah, Ismail, Mohd Hasmadi, Ahmad, Siti Azfanizam

    Published 2023
    “…A Bees Algorithm (BA) was proposed to find an optimum TTP for timber extraction, forest road, and landing locations with grid cell-sized 10 m × 10 m and attributed with fixed and variable costs. …”
    Get full text
    Get full text
    Article
  7. 7

    Stroke-to-stroke matching in on-line signature verification by Ahmad Jaini, Azhar

    Published 2010
    “…On-line Signature Verification is a field of verifying the time series signature data that normally obtained from the tablet-based device. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Augmentation of basic-line-search and quick-simplex-method algorithms to enhance linear programming computational performance by Nor Azlan, Nor Asmaa Alyaa

    Published 2021
    “…The methodology starts with literature comprehension studies on the computation pitfalls and existed augmentation studies of Simplex algorithm. Then, followed by concept development which consists of concept extraction, computation stages classification and algorithms integration. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Prediction of electronic cigarette and vape use among Malaysian: decision tree analysis by Kartiwi, Mira, Ab Rahman, Jamalludin, Nik Mohamed, Mohamad Haniki, Draman, Samsul, Ab Rahman, Norny Syafinaz

    Published 2017
    “…Results: By using the ID3 algorithm, it is possible to consider the relationship among variables and to identify the most informative variables for predicting the classification of the instance. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Multi road marking detection system for autonomous car using hybrid- based method by Shah, Khan Bahadur

    Published 2018
    “…Wu dataset that consist of 1208 road images, which were extracted from videos recorded around California, the proposed algorithm performed satisfactorily. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Characteristics of electronic cigarette and vape users in Malaysia: Lessons from decision tree analysis by Kartiwi, Mira, Nik Mohamed, Mohamad Haniki, Ab Rahman, Jamalludin, Draman, Samsul, Ab Rahman, Norny Syafinaz

    Published 2020
    “…Materials and Methods: A number of simulations was carried out on the dataset which was extracted from the National Electronic Cigarette Survey (NECS) 2016. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Computer-aided diagnosis of diabetic subjects by heart rate variability signals using discrete wavelet transform method by Acharya, U.R., Sudarshan, V.K., Ghista, D.N., Lim, W.J.E., Molinari, F., Sankaranarayanan, M.

    Published 2015
    “…These features are ranked by using various ranking methods, namely, Bhattacharyya space algorithm, t-test, Wilcoxon test, Receiver Operating Curve (ROC) and entropy. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area by Lim , Yen Ruen

    Published 2017
    “…Cryptographic hash functions are generally the basis of a secure network and used for data integrity verification. Cryptographic hash functions carried out processes such as identity verification, file integrity checking, secure key passing, and source code version control. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Short-term electricity price forecasting in deregulated electricity market based on enhanced artificial intelligence techniques / Alireza Pourdaryaei by Alireza , Pourdaryaei

    Published 2020
    “…A multi-objective feature technique is developed in this study to extract the most influential subsets of input variables with the maximum relevancy and minimum redundancy. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching by Ei Wei., Ting, M. Z., Ibrahim, D.J., Mulvaney

    Published 2017
    “…The Speeded-Up Robust Features (SURF) Algorithms is used to determine the interest points. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17

    The Estimation of Air Temperature from NOAA/AVHRR Images and the study of NDVI-Ts impact by Matori, A.N, Hassaballa, A. Haleem

    Published 2011
    “…From the brightness temperature in the images thermal bands 4&5 and using ε the surface temperature Ts was extracted using three different split-window algorithms. …”
    Get full text
    Get full text
    Article
  18. 18

    HEP-2 CELL IMAGES CLASSIFICATION BASED ON STATISTICAL TEXTURE ANALYSIS AND FUZZY LOGIC by Jamil, Nur Farahim

    Published 2014
    “…This project proposes a pattern recognition algorithm consisting of statistical methods to extract seven textural features from the HEp-2 cell images followed by classification of staining patterns by using fuzzy logic. …”
    Get full text
    Get full text
    Final Year Project
  19. 19
  20. 20