Search Results - (( based segmentation modified algorithm ) OR ( java _ implementation algorithm ))

Refine Results
  1. 1

    Variational model with image denoising fitting term for boundary extraction of breast ultrasound images by Badrulhisam, Nurdina, Ismail, Nurhuda, Jumaat, Abdul Kadir, Maasar, Mohd Azdi, Laham, Mohamed Faris

    Published 2023
    “…Consideration of four distinct image Denoising algorithms—Gaussian filter, Median filter, Wiener filter, and Rudin-OsherFatemi (ROF) algorithm—as the new fitting terms in the CDSS model leads to four variants of modified CDSS models called Modified CDSS based on Gaussian filter (MCDSSG), Modified CDSS based on Median filter (MCDSSM), Modified CDSS based on Wiener filter (MCDSSW) and Modified CDSS based on ROF (MCDSSROF). …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    UNSUPERVISED SEGMENTATION OF CORAL REEF IMAGES BY USING COLOR AND TEXTURE FEATURES by MOHAMMAD SAMEER ALOUN

    Published 2022
    “…This thesis proposed a modified JSEG algorithm to solve the problem of over segmentation when applying it to underwater coral reef images.…”
    Get full text
    Thesis
  3. 3

    An evolutionary harmony search algorithm with dominant point detection for recognition-based segmentation of online Arabic text recognition by Moayad, Yousif Potrus, Ngah, Umi Kalthum, Bestoun S. , Ahmed

    Published 2014
    “…At first, the pre-segmentation algorithm uses a modified dominant point detection algorithm to mark a minimal number of points which defines the text skeleton. …”
    Get full text
    Get full text
    Article
  4. 4

    A Hybrid Active Contour and Artificial Bee Colony Algorithm for Segmenting Mixed-Meal Food Images (S/O: 13239) by Harun, Nor Hazlyna, Mahmuddin, Massudi, Harun, Hazaruddin

    Published 2020
    “…In this research, a region-based active contour, which is regarded as an energy-minimizing process, is used for the purpose of image segmentation. …”
    Get full text
    Get full text
    Monograph
  5. 5

    Modified Contrast Limited Adaptive Histogram Equalization for high dynamic range images by Tung, Li Qian

    Published 2012
    “…The image was then segmented into smaller parts using pixel-region-based image segmentation method. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Development of a new algorithm for segmentation of flotation froth images by Jahedsaravani, Ali, Marhaban, Mohammad Hamiruce, Massinaei, Mohammad, Saripan, M. Iqbal, Mehrshad, Naser, Mohd Noor, Samsul Bahari

    Published 2014
    “…In the paper, the marker-based watershed method is modified to prevent oversegmentation of large bubbles. …”
    Get full text
    Get full text
    Article
  7. 7

    Fast marching method and modified features fusion in enhanced dynamic hand gesture segmentation and detection method under complicated background by Khalid, Eman Thabet, Khalid, Fatimah, Sulaiman, Puteri Suhaiza, Yaakob, Razali

    Published 2018
    “…Quantitative measurement was performed for evaluating hand gesture segmentation algorithm. Besides, qualitative measurement was done to conduct a comparison based on segmentation accuracy with previous studies. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Image enhancement and segmentation on simultaneous latent fingerprint detection by Rozita, Mohd Yusof

    Published 2015
    “…This thesis presents an algorithm to segment individual fingerprints for SLF image. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Weighted subsethood segmented fuzzy time series for moving holiday electricity load demand forecasting by Mansor, R., Kasim, M.M., Othman, M.

    Published 2020
    “…All these matters contributed to the uncertainty in load demand forecasting. This paper modifies the classical fuzzy time series (FTS) algorithm by applying weighted subsethood based algorithm (WSBA) in FTS algorithm using segmented electricity load demand time series data. …”
    Get full text
    Get full text
    Article
  10. 10

    Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments by Abdulhussain, Sadiq H.

    Published 2018
    “…In the proposed TVS, a modified candidate segment selection technique is initially employed to determine the candidate segments from the entire video. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    Microcrack Detection And Noise Reduction In Integrated Circuit Packages by Koh, Ye Sheng

    Published 2018
    “…Three algorithms are tested and evaluated in terms of microcrack detection and noise reduction which are probability based thresholding, histogram equalization, and modified Perona-Malik’s anisotropic diffusion methods. …”
    Get full text
    Get full text
    Monograph
  13. 13
  14. 14
  15. 15

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  16. 16

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  17. 17

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Real-time vision-based Malaysian road sign recognition using an artificial neural network / Kh Tohidul Islam by Kh Tohidul , Islam

    Published 2017
    “…This hybrid color segmentation algorithm contains a RGB histogram equalization, RGB color segmentation, modified grayscale segmentation, binary image segmentation, and a shape matching algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20