Search Results - (( java implementation _ algorithm ) OR ( framework segmentation learning algorithm ))
Search alternatives:
- framework segmentation »
- segmentation learning »
- java implementation »
- learning algorithm »
-
1
Enhanced Deep Learning Framework for Fine-Grained Segmentation of Fashion and Apparel
Published 2022“…This work proposes a deep learning framework that can learn how to detect and segment clothing objects accurately. …”
Get full text
Get full text
Article -
2
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…The temporal micro cluster data structure is proposed in CC_TRS algorithm to store the summarized information for each group of similar segments. …”
Get full text
Get full text
Thesis -
3
-
4
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
5
A Reinforcement Learning Based Adaptive ROI Generation for Video Object Segmentation
Published 2021“…The primary focus of the current deep learning-based models is to learn the discriminative representations in the foreground over motion and appearance in small-term temporal segments. …”
Get full text
Get full text
Article -
6
2TSS: Two-tier semantic segmentation framework with enhancement for hotspot detection of solar photovoltaic thermal images
Published 2025“…The proposed method is designed with two subsequent stages of segmentation models, including image pre-processing at the initial of the framework. …”
Get full text
Get full text
Get full text
Article -
7
A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework
Published 2019“…More effort has been taken in utilizing the data mining and machine learning algorithms to construct anomaly based intrusion detection systems, but the dependency on the learned models that were built based on earlier network behaviour still exists, which restricts those methods in detecting new or unknown intrusions. …”
Get full text
Get full text
Get full text
Article -
8
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
9
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
10
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
11
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
12
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
13
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
Get full text
Get full text
Get full text
Book -
14
-
15
Deep learning-based item classification for retail automation
Published 2025“…Real-time processing was achieved through the integration of object detection algorithms like YOLO and image segmentation techniques. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
17
Cooperative spectrum sensing based on machine learning in cognitive radio vehicular network / Mohammad Asif Hossain
Published 2022“…The tri-agent reinforcement learning (TA-RL) algorithm has been used by the segment spectrum agent (SSA) in this suggested CSS to make the global decision. …”
Get full text
Get full text
Get full text
Thesis -
18
Development of brain tumor segmentation of magnetic resonance imaging (MRI) using u-net deep learning
Published 2023“…This work demonstrated comparative performance and successful feasibility of implementing U-Net CNN architecture in an automated framework of brain tumor segmentations in Fluid-attenuated inversion recovery (FLAIR) MR Slices. …”
Article -
19
Analytical framework for predicting online purchasing behavior in Malaysia using a machine learning approach
Published 2025“…This study presents a post-pandemic machine learning-based analytical framework specifically designed for Malaysia’s ecommerce market. …”
Get full text
Get full text
Thesis -
20
Deep Reinforcement Learning Based Unmanned Aerial Vehicle (UAV) Control Using 3D Hand Gestures
Published 2022“…In this paper, we designed a hybrid framework, which is based on Reinforcement Learning and Deep Learning where the traditional electronic flight controller is replaced by using 3D hand gestures. …”
Get full text
Get full text
Article
