Search Results - (( java implementation developing algorithm ) OR ( parameter segmentation clustering algorithm ))

Refine Results
  1. 1

    Individual-tree segmentation and extraction based on LiDAR point cloud data by Liu, Xiaofeng, Abdullah, Muhamad Taufik, Mustaffa, Mas Rina, Nasharuddin, Nurul Amelina

    Published 2024
    “…Utilizing LiDAR point cloud data and ground-measured data from 30 plots, we examined the sensitivity of individual tree segmentation to key parameters by varying the grid values of the point cloud distance discriminant clustering algorithm and adjusting the canopy height resolution (CHR) of the watershed algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  3. 3
  4. 4

    Automatic Segmentation and Classification of Skin Lesions in Dermoscopic Images by Adil Humayun, Khan

    Published 2024
    “…The second segmentation algorithm combines Delaunay triangulation clustering in the spatial domain and Particle Swarm Optimization (PSO). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Model-based hybrid variational level set method applied to lung cancer detection by Jing, Wang, Liew, Siau-Chuin, Azian, Abd Aziz

    Published 2024
    “…Initially, the VLSM introduces a scale-adaptive fast level-set image segmentation algorithm to address the inefficiency of low gray scale image segmentation. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Cauchy density-based algorithm for VANETs clustering in 3D road environments by Jubair, Mohammed Ahmed, Ahmad, Mohd Riduan, Abdul Aziz, Izzatdin, Al-Obaidi, Ahmed Salih, Al-Tickriti, Abdullah Talaat, Hassan, Mustafa Hamid, Mostafa, Salama A., Mahdin, Hairulnizam

    Published 2022
    “…Clustering algorithms for VANETs operate in a decentralized mode, which requires incorporating additional stages before deciding the clustering decisions and might create sub-optimality due to the local nature of the decentralized approach. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Using Bimodal Gaussian Mixture Model-Based Algorithm for Background Segmentation in Thermal Fever Mass Screening by Siti Sofiah, Mohd Radzi, Kamarul Hawari, Ghazali, Nazriyah, Che Zan, Faradila, Naim

    Published 2011
    “…To estimate the bi - modal background-foreground distribution mixture parameters, Expectation-Maximization (EM) algorithm is applied and the images are clustered statistically and linearly. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Data stream clustering by divide and conquer approach based on vector model by Khalilian, Madjid, Mustapha, Norwati, Sulaiman, Nasir

    Published 2016
    “…The continuous effort on data stream clustering method has one common goal which is to achieve an accurate clustering algorithm. …”
    Get full text
    Get full text
    Article
  12. 12

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The aim of the thesis is to provide an overview of the ABS encryptiOn algorithm, to develop a prototype that is implemented for communication purpose, and to test the developed prototype in terms of accuracy purpose. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…Performance of the proposed algorithm was evaluated on the developed number plates’ image database captured by mobile phone’s camera, i.e. 30 images. …”
    Get full text
    Get full text
    Get full text
    Book
  16. 16

    Model-based hybrid variational level set method applied to object detection in grey scale images by Wang, Jing

    Published 2024
    “…In industrial inspection, segmentation algorithms detect product defects, cracks, or anomalies for quality control and safety. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Hence, the algorithm must overcome the problem of dynamic updates in the internal parameters or counter the concept drift. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Extracting crown morphology with a low-cost mobile LiDAR scanning system in the natural environment by Wang, Kai, Zhou, Jun, Zhang, Wenhai, Zhang, Baohua

    Published 2021
    “…After using the RANSAC algorithm to remove the map ground, the European clustering algorithm is used for point cloud segmentation. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…Using that process, we have settled on Java as our development platform as we found it able to both implement DA and the GIS component (map display and manipulation). …”
    Get full text
    Get full text
    Final Year Project