Search Results - (( developing using gray algorithm ) OR ( java application stemming algorithm ))
Search alternatives:
- application stemming »
- stemming algorithm »
- developing using »
- java application »
- gray algorithm »
- using gray »
-
1
IMPLEMENTATION OF IMAGE TEXTURE ANALYSIS USING GRAY LEVEL RUN LENGTH APPROACH
Published 2006“…The objective of this project is to develop algorithms inMATLAB and be able to implement image texture analysis by using the developed algorithms. …”
Get full text
Get full text
Final Year Project -
2
Algorithmic Loan Risk Prediction Method Based on PSO-EBGWO-Catboost
Published 2024“…To a certain extent, it avoids the inefficiency of the Gray Wolf algorithm, balances the ability of local search and global development, and improves the accuracy of the model. …”
Get full text
Get full text
Get full text
Article -
3
Non-invasive gliomas grading using swarm intelligence algorithm / Muhammad Harith Ramli
Published 2017“…The basic feature extraction of minimum, maximum and mean of gray level values are used as the parameter to develop the prototype. …”
Get full text
Get full text
Thesis -
4
Tumor Extraction for Brain Magnetic Resonance Imaging Using Modified Gaussian Distribution
Published 2006“…The mutual information algorithms used in this work has been developed and experimented in the system and has proven to yield more accurate and stable results than other algorithms. …”
Get full text
Get full text
Thesis -
5
Diabetic retinopathy detection using Gray-Level Co-Occurrence Matrix / Aliff Azfar Aris
Published 2022“…To achieve this, the Gray-Level Co-Occurrence Matrix (GLCM) is used to extract features from fundus images of patients. …”
Get full text
Get full text
Thesis -
6
Simulation-Based Power Estimation for High Throughput SHA-256 Design on Unfolding Transformation
Published 2022“…The algorithms are successfully designed using the Altera Quartus II platform. …”
Get full text
Get full text
Get full text
Proceeding -
7
Quality inspection of engraved image using based matching approach
Published 2011“…Color and gray scale charged couple device (CCD) cameras are used to acquire engraved image for different kind of environment. …”
Get full text
Get full text
Conference or Workshop Item -
8
Local gray level S-curve transformation – A generalized contrast enhancement technique for medical images
Published 2017“…In this research, a contrast enhancement algorithm that applies gray-level S-curve transformation technique locally in medical images obtained from various modalities is investigated. …”
Get full text
Get full text
Article -
9
Predictive Analytics in Genetic Engineering as an Optimization Problem
Published 2024“…The nature of the problem requires that a stochastic optimization algorithm be applied in the metaheuristic search rather than using a deterministic or mathematical approach. …”
Get full text
Get full text
Get full text
Article -
10
Algoritma Pengekstrakan Imej Cap Jari Berdasarkan Analisa Variasi Arah
Published 2002“…As a result, an extraction algorithm capable of extracting a skeleton structure from a digital 256 gray level fingerprint image was developed. …”
Get full text
Get full text
Get full text
Thesis -
11
Surface defect detection and polishing parameter optimization using image processing for G3141 cold rolled steel
Published 2016“…To realize this, automatic cropping algorithm is developed to detect the region of interest and interpret the Ga value. …”
Get full text
Get full text
Thesis -
12
Face Detection System / Chan Beh Teng
Published 2004“…The Face Detection System is implemented in visual Basic 6.0 The system was developed based on the Unified Process,which uses object-oriented paradigm as the basis of software development.…”
Get full text
Get full text
Thesis -
13
Development of Digital Image Processing Algorithms via FPGA Implementation
Published 2024“…Several digital image processing algorithms have been developed in this project, which are gray level transformation, brightness manipulation, contrast adjustment, thresholding, and inversion. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Enhancement of Single and Composite Images Based on Contourlet Transform Approach
Published 2009“…Image enhancement is an imperative step in almost every image processing algorithms. Numerous image enhancement algorithms have been developed for gray scale images despite their absence in many applications lately. …”
Get full text
Get full text
Thesis -
15
Development of scalable video compression algorithm
Published 2011Get full text
Get full text
Get full text
Book Chapter -
16
Micro-Crack Detection Of Solar Cells Featuring Adaptive Anisotropic Diffusion Filter And Semi-Supervised Support Vector Learning
Published 2014“…Nevertheless, the micro-crack defect exhibits some unique properties such as high in gradient and low gray-levels. These properties together with the shape feature of the micro-crack are used in developing the detection algorithm. …”
Get full text
Get full text
Thesis -
17
Application of texture analysis in echocardiography images for myocardial infarction tissue
Published 2007“…Texture analysis is an important characteristic for surface and object identification from medical images and many other types of images. This research has developed an algorithm for texture analysis using medical images do trained from echocardiography in identifying heart with suspected myocardial infarction problem. …”
Get full text
Get full text
Get full text
Article -
18
Review of wavelet theory and its application to image data compression
Published 2003“…The fast development of computing multimedia has led to the demand of using digital images. …”
Get full text
Get full text
Get full text
Article -
19
Steganography based on utilizing more surrounding pixels
Published 2010“…Conventional LSB method’s concept is used as the benchmark for the proposed algorithms. …”
Get full text
Get full text
Thesis -
20
Fingerprint recognition system : (prepocessing)
Published 2005“…Fingerprint recognition system was implementing for a long time in security system.Fingerprint is one of step to recognize the identity of person beside from signature because each person has a unique thumbprint although twin borne.The utilizing of this system is to enhance the security system in server room KUKTEM and only the authorized person will able to enter the room. This project develop prototype in concentrating on the preprocessing activities which are image acquisition, threshold and thinning.The objective of this project is to make a comparison between mean value and median value of threshold and make comparison between one pass and two pass algorithm of thinning.The prototype will only use 50 pieces gray scale JPEG image with the size of 240 x 240 pixels. …”
Get full text
Get full text
Undergraduates Project Papers
