Search Results - (( java evaluation from algorithm ) OR ( program segmentation using algorithm ))

Refine Results
  1. 1

    Development Of Semi-Automatic Liver Segmentation Method For Three-Dimensional Computed Tomography Dataset by Chiang, Yi Fan

    Published 2017
    “…In post-processing, the contour of liver is smooth by binary Gaussian filter. The liver segmentation program with proposed algorithm is evaluated with CT datasets obtained from SLIVER07 to prove its effectiveness in liver segmentation. …”
    Get full text
    Get full text
    Monograph
  2. 2
  3. 3
  4. 4

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Recognition of isolated elements picture using backpropagation neural network / Melati Sabtu by Sabtu, Melati

    Published 2005
    “…The project used Back-propagation Neural Network for the algorithm to classified images. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Word segmentation of output response for sign language devices by Za'bah, Nor Farahidah, Muhammad Nazmi, Ahmad Amierul Asyraf, Azman, Amelia Wong

    Published 2020
    “…The proposed text segmentation method in this work is by using the dynamic programming and back-off algorithm, together with the probability score using word matching with an English language text corpus. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…Therefore, FRA using FRT was constructed and the performance of the FRA was evaluated. The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Interactive blood vessel segmentation from retinal fundus image based on canny edge detector by Ibrahim, Haidi, Ooi, Alexander Ze Hwan, Soo, Siang Teoh, Embong, Zunaina, Abd Hamid, Aini Ismafairus, Zainon, Rafidah, Shir, Li Wang, Theam, Foo Ng, Hamzah, Rostam Affendi

    Published 2021
    “…The program will draw out the vessel edges. After that, those vessel edges will be segmented to bring focus on its details or detect the abnormal vessel. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Accuracy of advanced deep learning with tensorflow and keras for classifying teeth developmental stages in digital panoramic imaging by Norhasmira, Mohammad, Anuar Mikdad, Muad, Rohana, Ahmad, Mohd Yusmiaidil, Putera Mohd Yusof

    Published 2022
    “…Results: Image segmentation using the DP-AC algorithm enhanced the visibility of the image features in the region of interest while suppressing the image’s background noise. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Fast recovery of unknown coefficients in DCT-transformed images by Ong, Sim Ying, Li, Shujun, Wong, Kok Sheik, Tan, Kuan Yew

    Published 2017
    “…In this paper, we propose a fast hierarchical DCT coefficients recovery method by combining image segmentation and linear programming. In theory the proposed method can reduce the overall time complexity by a linear factor which is the number of image segments used. …”
    Get full text
    Get full text
    Article
  13. 13

    STATISTICAL FEATURE LEARNING THROUGH ENHANCED DELAUNAY CLUSTERING AND ENSEMBLE CLASSIFIERS FOR SKIN LESION SEGMENTATION AND CLASSIFICATION by Adil H., Khan, Dayang Nurfatimah, Awang Iskandar, Jawad F., Al-Asad, SAMIR, EL-NAKLA, SADIQ A., ALHUWAIDI

    Published 2021
    “…A boost ensemble learning algorithm using Support Vector Machines (SVM) as initial classifiers and Artificial Neural Networks (ANN) as a final classifier is employed to learn the patterns of different skin lesion class features. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16

    Moving detection using cellular neural network (CNN) by Prema Latha, Subramaniam

    Published 2008
    “…The algorithm created is used to detect the ball in the images. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms by Bakar, Abubakar Diwani

    Published 2016
    “…The software metric thresholds were used as indication for identifying unsafe design in software engineering. To evaluate this technique, an experiment was conducted on two geospatial systems developed using Java programming language where the Chidamber and Kemerer (CK) metrics were used. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
    Get full text
    Get full text
    Thesis
  20. 20

    OPTIMAL CABLE SELECTION IN RADIAL DISTRIBUTION NETWORKS CONSIDERING PLANNER'S DEFINED VOLTAGE DROP LIMIT by Ab Ghani, Mohd Ruddin

    Published 2002
    “…The resource of the cable inventory is also responsible for optimal selection of the cable. By using this proposed computer algorithm and program an example is solved successfully that is presented in the results.…”
    Get full text
    Get full text
    Conference or Workshop Item