Search Results - (( peer evaluation method algorithm ) OR ( pattern extraction using algorithm ))*
Search alternatives:
- pattern extraction »
- method algorithm »
- extraction using »
- peer evaluation »
- using algorithm »
-
1
Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier
Published 2018“…Classic local binary pattern (LBP) is one of the most useful feature extraction methods. …”
Get full text
Get full text
Monograph -
2
Integration Of Unsupervised Clustering Algorithm And Supervised Classifier For Pattern Recognition
Published 2017“…However, further study is needed in the feature extraction and clustering algorithms part as the performance of the pattern classification is still depending on the data input.…”
Get full text
Get full text
Thesis -
3
A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat
Published 2021“…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
Get full text
Get full text
Thesis -
4
APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN
Published 2011“…In our research, extraction pattern from the first module will be fed to this algorithm and is used to make the prediction of named entity candidate category. …”
Get full text
Get full text
Thesis -
5
Comparison Of Ridge Filters Performance in Human Vein Extraction Using 850nm Near Infrared Led Illumination
Published 2023“…This paper investigates the performance of the ridge filters algorithm for vein feature extraction by using the NIR imaging technique to visualise human vein vessels. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
6
Identifying melanoma characteristics using directional imaging algorithm and convolutional neural network on dermoscopic images / Mohammad Asaduzzaman Rasel
Published 2024“…Several imaging, computer vision, and pattern recognition algorithms are employed to describe five dermoscopic features. …”
Get full text
Get full text
Get full text
Thesis -
7
-
8
Opposition Based Competitive Grey Wolf Optimizer For EMG Feature Selection
Published 2020“…Initially, several useful features are extracted from the EMG signals to construct the feature set. …”
Get full text
Get full text
Get full text
Article -
9
Image Stitching Of Aerial Footage
Published 2021“…The images are warped to the key frame of the footage to generate a stitched image by using the computed homography. The algorithm performance is evaluated using the Orchard datasets, consisting of L-shape flight pattern and lawnmower flight pattern. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Computer-aided acute leukemia blast cells segmentation in peripheral blood images
Published 2015“…The method also introduces an approach to split overlapping cells using the marker-controlled watershed algorithm based on a new marker selection scheme. …”
Get full text
Article -
11
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
Get full text
Get full text
Get full text
Thesis -
12
Towards a Malay derivational lexicon: learning affixes using expectation maximization
Published 2011“…We train the model with EM to find the segmentation that maximizes the probability of each morpheme. We extract the set of affix patterns produced by our algorithm and evaluate them against two references: a list of affix patterns extracted from our hand-segmented derivational wordlist and a derivational history produced by a stemmer.…”
Get full text
Get full text
Get full text
Proceeding Paper -
13
An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA
Published 2025“…However, these algorithms often fall short in consistently detecting and classifying network intrusions, particularly when distinctions between classes are subtle or when facing evolving attack patterns. …”
Get full text
Get full text
Get full text
Thesis -
14
Analytical method for forensic investigation of social networking applications on smartphones
Published 2016“…Moreover, an algorithm was designed that automatically extracts social networking data remnants from smartphones using the identified patterns. …”
Get full text
Get full text
Get full text
Thesis -
15
FEATURES EXTRACTION OF HEP-2 IMMUNOFLUORESCENCE PATTERNS BASED ON TEXTURE AND REGION OF INTEREST TECHNIQUES
Published 2013“…Next, to design an algorithm that can automatically identify the 2 patterns of the HEp-2 cell tested using ANA. …”
Get full text
Get full text
Final Year Project -
16
Photogrammetric low-cost unmanned aerial vehicle for pothole detection mapping / Shahrul Nizan Abd Mukti
Published 2022“…The study set four main objectives to achieve its aim: (1) To analyse RGB and multispectral sensor calibration, (2) To evaluate the optimal flight parameters for pothole modelling production using RGB imagery, (3) To investigate various classifier algorithms and band combinations for pothole region areas using multispectral imagery and (4) To validate geometric information from the extracted pothole. …”
Get full text
Get full text
Thesis -
17
Feature detector-level fusion methods in food recognition
Published 2019“…An automatic dietary pattern assessment via food recognition algorithm provide an alternative way to improve the overall quality of dietary pattern assessment. …”
Get full text
Get full text
Conference or Workshop Item -
18
Liver segmentation on CT images using random walkers and fuzzy c-means for treatment planning and monitoring of tumors in liver cancer patients
Published 2017“…This is followed by the clustering of the liver tissues using particle swarm optimized spatial FCM algorithm. …”
Get full text
Get full text
Get full text
Thesis -
19
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
Published 2016“…Moreover, feature vectors for a circular patch around Harris points are extracted using Hӧlder estimation regularity based descriptor (HGP-2) to reduce false positives. …”
Get full text
Get full text
Thesis -
20
Evaluation of intonation features on emphasized Malay words / Syazwani Nasaruddin
Published 2017“…Activities in this section are, for testing part, 314 words from 2 different speakers are evaluated by using clustering method. WEKA is a set of machine learning algorithm for data mining task. …”
Get full text
Get full text
Thesis
