Search Results - (( code classification _ algorithm ) OR ( image classification problem algorithm ))

Refine Results
  1. 1

    Scene classification for aerial images based on CNN using sparse coding technique by Qayyum, A., Malik, A.S., Saad, N.M., Iqbal, M., Faris Abdullah, M., Rasheed, W., Rashid Abdullah, T.A., Bin Jafaar, M.Y.

    Published 2017
    “…Aerial scene classification purposes to automatically label aerial images with specific semantic categories. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning by Safa, Soodabeh

    Published 2016
    “…Beside that, classic bag of visual words algorithm (BoVW) is based on kmeans clustering and every SIFT feature belongs to one cluster and it leads to decreasing classification results. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Whale Optimisation Freeman Chain Code (WO-FCC) extraction algorithm for handwritten character recognition by Muhammad Arif, Mohamad, Jamaludin, Sallim, Kohbalan, Moorthy

    Published 2021
    “…In order to improve the classification accuracy in the field of handwriting character recognition (HCR), the number of derivative algorithms has improved and the interest in feature extraction has increased. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A Modified Hopfield Neural Network Algorithm (MHNNA) Using ALOS Image for Water Quality Mapping by Ahmed Asal Kzar, Ahmed Asal Kzar, M Jafri, Mohd Zubir, Mutter, Kussay N., Anwar, Saumi Syahreza

    Published 2016
    “…The TSS map was color-coded for visual interpretation. The efficiency of the proposed algorithm was investigated by dividing the validation data into two groups. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A multilayered convolutional sparse coding framework for modeling of pooling operation of convolution neural networks by , Abdul Wahid, Khan, Adnan Umar, , Mukhtarullah, Khan, Sheroz, Shah, Jawad

    Published 2019
    “…The multilayered version of CSC(ML-CSC) is shown to be connected to forward pass of CNNs and dictionary learning and sparse coding algorithms of this model are analyzed for solving classification and inverse problems in image processing. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    Using genetic algorithms to optimise land use suitability by Pormanafi, Saeid

    Published 2012
    “…Land use/ Land Cover is obtained by satellite image processing that the overall kappa of the classification is 87.4% and the overall accuracy is 89.6%. …”
    Get full text
    Get full text
    Thesis
  8. 8

    An improved defect classification algorithm for six printing defects and its implementation on real printed circuit board images by Ibrahim, I., Ibrahim, Z., Khalil, K., Mokji, M.M., Abu Bakar, S.A.R.S., Mokhtar, N., Ahmad, W.K.W.

    Published 2012
    “…The defect classification algorithm is improved by incorporating proper image registration and thresholding techniques to solve the alignment and uneven illumination problem. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…This paper presents a classification of android malware using candidate detectors generated from an unsupervised association rule of Apriori algorithm improved with particle swarm optimization to train three different supervised classifiers. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2015
    “…However, supervised learning technique has limitations for malware classification task. This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Supervised ANN classification for engineering machined textures based on enhanced features extraction and reduction scheme by Ashour, Mohammed Waleed, Khalid, Fatimah, Al-Obaydee, Mohammed

    Published 2013
    “…Some of the main problems of image classification are the poor features that does not precisely represent an image, and the large dimensionality of data input passed to classifiers. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Extremal region detection and selection with fuzzy encoding for food recognition by Razali @ Ghazali, Mohd Norhisham

    Published 2019
    “…The first algorithm locates interest points in food images using an MSER. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad by Ahmad, Khairul Adilah

    Published 2018
    “…In general, image segmentation isolates an object from the images, feature extraction creates features for classification phase while object classification categorizes objects into the correct groups. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    UNSUPERVISED SEGMENTATION OF CORAL REEF IMAGES BY USING COLOR AND TEXTURE FEATURES by MOHAMMAD SAMEER ALOUN

    Published 2022
    “…This thesis proposed a modified JSEG algorithm to solve the problem of over segmentation when applying it to underwater coral reef images.…”
    Get full text
    Thesis
  18. 18

    Image authentication using Zernike moment watermarking by Shojanazeri, Hamid

    Published 2013
    “…The adding or replacing a portion of the image is regarded as malicious attacks and rejected by this algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20