Search Results - (( (evolution OR solution) segmentation means algorithm ) OR ( java implication _ algorithm ))
Search alternatives:
- segmentation means »
- java implication »
- means algorithm »
-
1
Initialization Methods For Conventional Fuzzy C-Means And Its Application Towards Colour Image Segmentation
Published 2011“…Due to its capability in providing a particularly promising solution to clustering problems, the conventional Fuzzy C-Mean (FCM) algorithm is widely used as a segmentation method. …”
Get full text
Get full text
Thesis -
2
-
3
A hyper-heuristic based strategy for image segmentation using multilevel thresholding
Published 2025“…Among others, multilevel thresholding is a robust and most widely adopted image segmentation approach. To find the optimal multilevel threshold values, various heuristic and meta-heuristic algorithms have been applied to segment COVID-19 medical images. …”
Get full text
Get full text
Get full text
Article -
4
A hyper-heuristic based strategy for image segmentation using multilevel thresholding
Published 2025“…Among others, multilevel thresholding is a robust and most widely adopted image segmentation approach. To find the optimal multilevel threshold values, various heuristic and meta-heuristic algorithms have been applied to segment COVID-19 medical images. …”
Get full text
Get full text
Get full text
Article -
5
Optic cup and optic disc segmentation using improved selfish gene algorithm / Norharyati Md Ariff
Published 2016“…In addition, this new algorithm is compared to color channel multi-thresholding segmentation and artificial intelligence segmentation based clustering method such as Adaptive Neuro-Fuzzy Inference System (ANFIS) and Fuzzy cMeans (FCM). …”
Get full text
Get full text
Thesis -
6
Segmenting CT images of bronchogenic carcinoma with bone metastases using PET intensity markers approach
Published 2009“…The results show that the mean standard error for over segmented pixels is 33% while for the under segmented pixels is 3.4%. …”
Get full text
Get full text
Article -
7
Enhanced image segmentation in thermal infrared image processing for faulty detection on broadcasting equipment / Mohd Rizman Sultan Mohd, Sukreen Hana Herman and Zaiton Sharif
Published 2018“…The data gathered from the system will undergo enhanced image segmentation method using k-means clustering with the implementation of histogram equalization for further image processing algorithm to detect the presence of hot spot. …”
Get full text
Get full text
Get full text
Article -
8
Dynamic Economic Dispatch For Power System
Published 2016“…The solution algorithm based on a constraint relaxation and period-by-period is developed and tested. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
A NOVEL FORWARD BACKWARD LINEAR PREDICTION ALGORITHM FOR SHORT TERM POWER LOAD FORECAST
Published 2010“…The proposed AR-based algorithm divides long data record into short segments and searches for the AR coefficients that simultaneously model the data with the least means squared errors. …”
Get full text
Get full text
Thesis -
10
An Intelligent System Approach to the Dynamic Hybrid Robot Control
Published 1996“…From this point the Artificial Neural Networks (ANN) based solution approach was verified for the inverse kinematics solution. …”
Get full text
Get full text
Thesis -
11
A selective approach for energy-aware video content adaptation decision-taking engine in android based smartphone
Published 2019“…The EnVADE algorithm uses selective mechanism. Selective mechanism means the video segmented into scenes and adaptation process is done based on the selected scenes. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
A selective approach for energy-aware video content adaptation decision-taking engine in android based smartphone
Published 2019“…The EnVADE algorithm uses selective mechanism. Selective mechanism means the video segmented into scenes and adaptation process is done based on the selected scenes. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…In addition, it is considered that existing solutions do not provide a feature driftaware solution to the concept drift adaptable solution, which exploits the fact that many of the original features are non-relevant. …”
Get full text
Get full text
Thesis -
14
-
15
Data stream clustering by divide and conquer approach based on vector model
Published 2016“…The continuous effort on data stream clustering method has one common goal which is to achieve an accurate clustering algorithm. However, there are some issues that are overlooked by the previous works in proposing data stream clustering solutions; (1) clustering dataset including big segments of repetitive data, (2) monitoring clustering structure for ordinal data streams and (3) determining important parameters such as k number of exact clusters in stream of data. …”
Get full text
Get full text
Article -
16
Defect Detection And Classification Of Silicon Solar Wafer Featuring Nir Imaging And Improved Niblack Segmentation
Published 2016“…The classification combines the analysis of defect intensity features, the application of unsupervised k-mean clustering and multi-class SVM algorithms. …”
Get full text
Get full text
Thesis -
17
A headway and order scheme based mixed integer goal programming model for railway rescheduling / Zuraida Alwadood
Published 2017“…The model is solved by means of preemptive goal programming technique, using MATLAB r2014a, which automatically generates the optimal solution to the problem. …”
Get full text
Get full text
Thesis -
18
-
19
Low-distortion MMSE speech enhancement estimator based on laplacian prior
Published 2017“…The most well-known conventional speech enhancement algorithms introduce unwanted artifact noise and speech distortion to the enhanced signal. …”
Get full text
Get full text
Get full text
Article -
20
Obfuscatable aggregatable signcryption scheme with PadSteg for unattended devices in IoT systems
Published 2019“…Motivated by this issue, we propose Signcryption Obfuscatable and Steganography-PadSteg (SOS) algorithm as a solution. Having Signcryption (digital signature and encryption) at each node is the baseline of security but the caveat is that the computational power of these components means both mechanisms will not be of highest security level hence the need to protect the information as it travels for a final process of obfuscation. …”
Get full text
Get full text
Thesis
