نتایج جستجو برای: knearest neighbor

تعداد نتایج: 23101  

2011
Imad Zyout Ikhlas Abdel-Qader

Texture-based computer-aided diagnosis (CADx) of microcalcification clusters is more robust than the state-of-art shape-based CADx because the performance of shape-based approach heavily depends on the effectiveness of microcalcification (MC) segmentation. This paper presents a texture-based CADx that consists of two stages. The first one characterizes MC clusters using texture features from gr...

2003
Frank Chung-Hoon Rhee Cheul Hwang

This paper presents an interval type-2 fuzzy Knearest neighbor (NN) algorithm that is an extension of the type1 fuzzy K-NN algorithm proposed in [l]. In our proposed method, the membership values for each vector are 'extended as interval type-2 fuzzy memberships by assigning uncertainty to the type-1 memberships. By doing so, the classification result obtained by the interval type-2 fuzzy K-NN ...

2012
Zaher Al Aghbari

Many Data Mining techniques use the whole features space in the classification process. This feature space might contain irrelevant, or redundant, features that could reduce the accuracy of classification. This paper presents an approach to select a subset of features that are most relevant to the classification application. We use a wrapper approach to search for relevant subset of features, w...

2015
Kazuo Hara Ikumi Suzuki Masashi Shimbo Kei Kobayashi Kenji Fukumizu Milos Radovanovic

Hubness has been recently identified as a problematic phenomenon occurring in high-dimensional space. In this paper, we address a different type of hubness that occurs when the number of samples is large. We investigate the difference between the hubness in highdimensional data and the one in large-sample data. One finding is that centering, which is known to reduce the former, does not work fo...

2004
Mohammad Kabir Hossain Abu Ahmed Sayeem Reaz Rajibul Alam

Face recognition has recently received remarkable attention in both authentication and identification systems due to high acceptability and collectability, regardless its lower circumvention and uniqueness than other biometric verification technologies. The basic approach with face recognition commences with feature set construction from the relevant facial traits of the users, termed enrollmen...

2007
Ravindra Hegadi B. V. Dhandra

Endoscopic images do not contain sharp edges to segment using the traditional segmentation methods for obtaining edges. Therefore, the active contours or ‘snakes’ using level set method with the energy minimization algorithm is adopted here to segment these images. The results obtained from the above segmentation process will be number of segmented regions. The boundary of each region is consid...

2015
Tarik A. Rashid

Classify cases in one of two classes referred to as a binary classification. However, some classification algorithms will allow, of course the use of more than two classes. This research work focuses on improving the results of classification models of multiple classes via some effective techniques. A case study of students’ achievement at Salahadin University is used in this research work. The...

1980
S. Ravi

Cognitive radio systems require detection of different signals for communication. In this study, an approach for multiclass signal classification based on second-order statistical feature is proposed. The proposed system is designed to recognize three different digital modulation schemes such as PAM, 32QAM and 64QAM. The signal classification is achieved by extracting the 2nd order cumulants of...

2015
Chandra Prakash Ravish R. Singh Om Prakash

In machine interaction with human being is yet challenging task that machine should be able to identify and react to human non-verbal communication such as emotions which makes the human computer interaction become more natural. In present research area automatic emotion recognition using speech is an essential task which paid close attention. Speech signal is a rich source of information and i...

2010
Kyaw Thet Khaing

Today, as the increasing the amount of using internet, there are so most information interchanges are performed in that internet. So, the methods used as intrusion detective tools for protecting network systems against diverse attacks are became too important. The available of IDS are getting more powerful. Support Vector Machine was used as the classical pattern reorganization tools have been ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید