Search Results - (( image classification problems algorithm ) OR ( data validation using algorithm ))
Search alternatives:
- image classification »
- validation using »
- data validation »
- using algorithm »
- problems »
-
1
A Modified Hopfield Neural Network Algorithm (MHNNA) Using ALOS Image for Water Quality Mapping
Published 2016“…The TSS concentration measurements were conducted in a lab and used for validation (real data), classification, and accuracy assessments. …”
Get full text
Get full text
Get full text
Article -
2
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…Lastly, a new hybrid technique suggests tackling the current image encryption application problem by using the estimated parameters of chaotic systems with an optimization algorithm, the SKF algorithm. …”
Get full text
Get full text
Thesis -
3
Development of rheumatoid arthritis classification from electronic image sensor using ensemble method
Published 2020“…The data classification is accessed using holdout and 10-fold cross-validation evaluation methods. …”
Get full text
Get full text
Article -
4
Dorsal Hand Vein Pattern Recognition: A Comparison between Manual and Automatic Segmentation Methods
Published 2023“…The HHM combined histogram equalization and morphological and thresholding-based algorithms to localize veins from hand images. The data were divided into training, validation, and testing sets with an 8:1:1 ratio before training AlexNet. …”
Get full text
Get full text
Get full text
Article -
5
Dorsal Hand Vein Pattern Recognition: A Comparison between Manual and Automatic Segmentation Methods
Published 2023“…The HHM combined histogram equalization and morphological and thresholding-based algorithms to localize veins from hand images. The data were divided into training, validation, and testing sets with an 8:1:1 ratio before training AlexNet. …”
Get full text
Get full text
Get full text
Article -
6
Dorsal Hand Vein Pattern Recognition: A Comparison between Manual and Automatic Segmentation Methods
Published 2023“…The HHM combined histogram equalization and morphological and thresholding-based algorithms to localize veins from hand images. The data were divided into training, validation, and testing sets with an 8:1:1 ratio before training AlexNet. …”
Get full text
Get full text
Get full text
Article -
7
Dorsal Hand Vein Pattern Recognition: A Comparison between Manual and Automatic Segmentation Methods
Published 2023“…The HHM combined histogram equalization and morphological and thresholding-based algorithms to localize veins from hand images. The data were divided into training, validation, and testing sets with an 8:1:1 ratio before training AlexNet. …”
Get full text
Get full text
Get full text
Article -
8
Dorsal Hand Vein Pattern Recognition: A Comparison between Manual and Automatic Segmentation Methods
Published 2023“…The HHM combined histogram equalization and morphological and thresholding-based algorithms to localize veins from hand images. The data were divided into training, validation, and testing sets with an 8:1:1 ratio before training AlexNet. …”
Get full text
Get full text
Get full text
Article -
9
Machine-learning approach using thermal and synthetic aperture radar data for classification of oil palm trees with basal stem rot disease
Published 2021“…The sampling-based method, also known as the data level method, is used to deal with this problem. …”
Get full text
Get full text
Thesis -
10
Wavelet-Based Fractal Analysis of rs-fMRI for Classification of Alzheimer�s Disease
Published 2022“…From this matrix, significant connections evaluated using the p-value are selected as an input to a classifier for the classification of Alzheimerâ��s vs. normal controls. …”
Get full text
Get full text
Article -
11
Computer aided diagnoses for detecting the severity of Keratoconus
Published 2024“…The study proposed an image analysis method for corneal topography images using MATLAB R2020a. …”
Get full text
Get full text
Get full text
Article -
12
An improved defect classification algorithm for six printing defects and its implementation on real printed circuit board images
Published 2012“…The defect classification algorithm is improved by incorporating proper image registration and thresholding techniques to solve the alignment and uneven illumination problem. …”
Get full text
Get full text
Get full text
Article -
13
Supervised ANN classification for engineering machined textures based on enhanced features extraction and reduction scheme
Published 2013“…Some of the main problems of image classification are the poor features that does not precisely represent an image, and the large dimensionality of data input passed to classifiers. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Classification model for water quality using machine learning techniques
Published 2015Get full text
Get full text
Article -
15
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…The first algorithm locates interest points in food images using an MSER. …”
Get full text
Get full text
Thesis -
16
RLMD-PA: A Reinforcement Learning-Based Myocarditis Diagnosis Combined with a Population-Based Algorithm for Pretraining Weights
Published 2024journal::journal article -
17
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…In general, image segmentation isolates an object from the images, feature extraction creates features for classification phase while object classification categorizes objects into the correct groups. …”
Get full text
Get full text
Thesis -
18
UNSUPERVISED SEGMENTATION OF CORAL REEF IMAGES BY USING COLOR AND TEXTURE FEATURES
Published 2022“…This thesis proposed a modified JSEG algorithm to solve the problem of over segmentation when applying it to underwater coral reef images.…”
Get full text
Thesis -
19
-
20
Image authentication using Zernike moment watermarking
Published 2013“…The adding or replacing a portion of the image is regarded as malicious attacks and rejected by this algorithm. …”
Get full text
Get full text
Thesis
