Search Results - (( java implementation path algorithm ) OR ( knowledge segmentation method algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Fuzzy modeling of brain tissues in Bayesian segmentation of brain MR images by Farzan, Ali, Ramli, Abdul Rahman, Mashohor, Syamsiah, Mahmud, Rozi

    Published 2010
    “…A two-fold fuzzy segmentation algorithm based on Bayesian method is proposed in this paper. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Region-growing based segmentation and bag of features classification for breast ultrasound images by Lee, Lay Khoon

    Published 2017
    “…Therefore, there appears to be a gap between the knowledge of region growing segmentation and ultrasound tumors segmentation. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant by Morshidi, Malik Arman

    Published 2007
    “…Multi-layer perceptron (MLP) neural network trained using backpropagation algorithm is used to segment the color image. The results of color segmentation show that the algorithm is able to segment the images reliably with less appearance of small blobs. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Determination of tree height based on tree crown using algorithm derived from UAV imagery / Suzanah Abdullah ... [et al.] by Abdullah, Suzanah, Tahar, Khairul Nizam, Abdul Rashid, Mohd Fadzil, Osoman, Muhammad Ariffin

    Published 2021
    “…As a conclusion, this study has contributed to the knowledge extension in this area and presented the result of the tree height values according to the segmentation algorithm at the different flying height data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    A Reinforced Active Learning Algorithm for Semantic Segmentation in Complex Imaging by Usmani, U.A., Watada, J., Jaafar, J., Aziz, I.A., Roy, A.

    Published 2021
    “…Our results infer that our approach demands more labels from under-represented groups than the baselines, thus enhancing their efficiency and mitigating the class imbalance. Our method's performance is superior to the conventional deep learning models in detecting 8 out of 11 classes on the Camvid road segmentation scene dataset. …”
    Get full text
    Get full text
    Article
  10. 10

    Old Jawi manuscript: Digital recognition / Zaidi Razak by Zaidi, Razak

    Published 2016
    “…The literature review in this research looks at works conducted in the past on line and character segmentation as well as recognition systems. The information gathered is useful for the development of a line segmentation algorithm, a new character segmentation algorithm, as well as a recognition algorithm which is based on the use of a unique code and Hamming distance calculation. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Coronary artery segmentation in angiograms with pattern recognition techniques - a survey by Tayebi, Rohollah Moosavi, Sulaiman, Puteri Suhaiza, O. K. Rahmat, Rahmita Wirza, Dimon, Mohd Zamrin, Kadiman, Suhaini, Abdullah, Lilly Nurliyana, Mazaheri, Samaneh

    Published 2013
    “…Coronary artery segmentation algorithm in angiograms is a fundamental component of each cardiac image processing system. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Segmenting microcalcifications using enhanced distance active contour (EDAC) / Siti Salmah Yasiran by Yasiran, Siti Salmah

    Published 2010
    “…This study sets out to explore the Active Contour models to segment object boundaries using the Distance Active Contour (DAC) method. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Segmenting the right ventricle cavity from 4D echocardiography images for stroke volume measurement by Abboud, Anas A.

    Published 2014
    “…By reviewing most of the previous work in the literature, there are different methods used to segment the right ventricle (RV) cavity, such as boundary based detection, texture, and regional segmentation methods. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework by Udzir, Nur Izura, Hajamydeen, Asif Iqbal

    Published 2019
    “…Observing network traffic flow for anomalies is a common method in Intrusion Detection. More effort has been taken in utilizing the data mining and machine learning algorithms to construct anomaly based intrusion detection systems, but the dependency on the learned models that were built based on earlier network behaviour still exists, which restricts those methods in detecting new or unknown intrusions. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Recognition of isolated elements picture using backpropagation neural network / Melati Sabtu by Sabtu, Melati

    Published 2005
    “…For overall, the back-propagation algorithm has been proved as a method that can be used for recognition areas.…”
    Get full text
    Get full text
    Thesis
  18. 18

    Computed tomography and echocardiography image fusion technique for cardiac images by Kalahroodi, Samaneh Mazaheri

    Published 2016
    “…Then, a segmentation approach based on a constrained Level set method is developed to identify the feature from Echocardiography images. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Automated Detection and Classification of Retinal Vein Occlusion Using Ultra-widefield Retinal Fundus Images and Transfer Learning by Ivy Ong Siaw Yin, Ong

    Published 2024
    “…The study aims to develop automated methods for the segmentation and classification of RVO in UWF fundus images. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20