Search Results - (( text detection method algorithm ) OR ( using function method algorithm ))

Refine Results
  1. 1

    Dissimilarity algorithm on conceptual graphs to mine text outliers by Kamaruddin, Siti Sakira, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Mat Nor, Fauzias

    Published 2009
    “…In Comparison to other text outlier detection method, this approach managed to capture the semantics of documents through the use of CGs and is convenient to detect outliers through a simple dissimilarity function.Furthermore, our proposed algorithm retains a linear complexity with the increasing number of CGs.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    A Novel Method for Detecting Breast Cancer Location Based on Growing GA-FCM Approach by Milad Abaspoor, Saeed Meshgini, Tohid Yousefi Rezaii, Ali Farzamnia

    Published 2020
    “…In this paper, we used manual methods and use of FCM as the function of genetic algorithm fitness. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Soft robotic glove system controlled with amplitude independent muscle activity detection algorithm by using single sEMG channel by Hameed, Husamuldeen Khalid, Wan Hasan, Wan Zuha, Shafie, Suhaidi, Ahmad, Siti Anom, Jaafar, Haslina

    Published 2018
    “…The merging of these two methods enables the algorithm to distinguish between hand open and hand close activities by using sEMG signal collected by only one channel. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Integrated face detection approach for far image application by Salka, Tanko Daniel

    Published 2016
    “…The last stage of the algorithm is to apply the Euler method, in which its function is to search for the facial features. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Cars detection in stitched image using morphological approach by Joselyn, Jok.

    Published 2017
    “…The method is improved by using algorithm which removes noise by sizes. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  6. 6

    Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani by Seyed Asadollah, Abdiesfandani

    Published 2016
    “…To evaluate the algorithm, we conducted two experiments. In the first experiment, we examine the functionality of the system, whether the system is able to identify the summarizing strategies used by students in summary writing. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Neural network algorithm-based fall detection modelling by Mohd Yusoff, Ainul Husna, Koh, Cheng Zhi, Ngadimon, Khairulnizam, Md Salleh, Salihatun

    Published 2020
    “…The algorithm is trained by network training function; LM, SCG and RP by collocation with threshold-based setting value. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Optimizing high-density aquaculture rotifer Detection using deep learning algorithm by Alixson Polumpung, Kit Guan Lim, Min Keng Tan, Sitti Raehanah Muhamad Shaleh, Renee Ka Yin Chin, Kenneth Teo Tze Kin

    Published 2022
    “…Second, is to develop the deep learning algorithm based on YOLOv3. Third step is to training and evaluate the model using loss function. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  9. 9
  10. 10

    Smart fall detection by enhanced SVM with fuzzy logic membership function by Harum, Norharyati, Khalil, Mohamad Kchouri, Hazimeh, Hussein, Obeid, Ali

    Published 2023
    “…So far, the most widely used fall prediction methods collect data from inertial measurement unit (IMU) sensors. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine by Fathi Mahdi Elsiddig Haroun, Mr.

    Published 2023
    “…In this dissertation, a new vegetation encroachment detection method was proposed by studying the feasibility of using the visible-light band of highresolution satellite images using the RetinaNet deep learning model and Support Vector Machine algorithm (SVM). …”
    text::Thesis
  12. 12

    Deviation detection in text using conceptual graph interchange format and error tolerance dissimilarity function by Kamaruddin, Siti Sakira, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Mat Nor, Fauzias

    Published 2012
    “…This paper focuses on a graph-based approach for text representation and presents a novel error tolerance dissimilarity algorithm for deviation detection. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification by Abd Samad, Md Fahmi

    Published 2011
    “…Identification studies using NARX (Nonlinear AutoRegressive with eXogenous input) models employing simulated systems and real plant data are used to demonstrate that the algorithm is able to detect significant variables and terms faster and to select a simpler model structure than other well-known EC methods.…”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Multiple and solid data background scheme for testing static single cell faults on SRAM memories by Zakaria, Nor Azura

    Published 2013
    “…This method is evaluated in terms of function and performance differences between the proposed MTA and existing MTA using the User Defined Algorithm (UDA) available in the MBISTArchitect tool. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y... by M.Yusop, Hanafi, Ghazali, M.F., M.Yusof, M.F., W.Hamat, W.S.

    Published 2017
    “…Meanwhile, a random signal was also generated to test the efficiency of I-Kaz-kurtosis ratio. The analysis results using I-Kaz-kurtosis ratio revealed that the method was suggested to be used as self-decision method to select the right IMF. …”
    Get full text
    Get full text
    Article
  17. 17

    A fingerprint matching algorithm using bit-plane extraction method with phase-only correlation by Florence, Francis-Lothai, Bong, David B L

    Published 2017
    “…Before bit-plane is extracted, the fingerprint image is enhanced by using Fourier transform. Bit-plane 7 of the enhanced image is used as the input for fingerprint matching with phase-only correlation (POC) function. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…This algorithm was minimal in line code to make it lightweight and made use of the controller's functionality without adding extra computational burden on the controller.…”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    An efficient anomaly intrusion detection method with evolutionary neural network by Sarvari, Samira

    Published 2020
    “…The third proposed method is a new Evolutionary Neural Network (ENN) algorithm with a combination of Genetic Algorithm and Multiverse Optimizer (GAMVO) as a training part of ANN to create efficient anomaly-based detection with low false alarm rate. …”
    Get full text
    Get full text
    Thesis