Search Results - (( java implementation tree algorithm ) OR ( knowledge segmentation based algorithm ))
Search alternatives:
- knowledge segmentation »
- java implementation »
- implementation tree »
- tree algorithm »
-
1
Fuzzy modeling of brain tissues in Bayesian segmentation of brain MR images
Published 2010“…A two-fold fuzzy segmentation algorithm based on Bayesian method is proposed in this paper. …”
Get full text
Get full text
Conference or Workshop Item -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…In this research, a vision system algorithm has been developed to identify and locate base of young corn trees based upon robot vision technology, pattern recognition techniques, and knowledge-based decision theory. …”
Get full text
Get full text
Thesis -
4
-
5
Determination of tree height based on tree crown using algorithm derived from UAV imagery / Suzanah Abdullah ... [et al.]
Published 2021“…The single tree crown was obtained from the digital surface model by using four algorithms such as watershed segmentation, object based image analysis, inverse watershed segmentation and seed generation. …”
Get full text
Get full text
Conference or Workshop Item -
6
-
7
A feature-based approach for segmenting faces
Published 2004“…We identify that the key factor in a generic and robust system is that of using a large amount of image evidence, related and reinforced by model knowledge through a probabilistic framework. In this paper, we propose a feature-based algorithm for segmenting faces that is sufficiently generic and is also easily extensible to cope with more demanding variations of the imaging conditions. …”
Get full text
Get full text
Article -
8
-
9
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
10
Coronary artery segmentation in angiograms with pattern recognition techniques - a survey
Published 2013“…But based on our knowledge, there is not any review paper to categorize and compare them together. …”
Get full text
Get full text
Conference or Workshop Item -
11
A Reinforced Active Learning Algorithm for Semantic Segmentation in Complex Imaging
Published 2021“…We propose a new reinforced active learning strategy based on a deep reinforcement learning algorithm. …”
Get full text
Get full text
Article -
12
Old Jawi manuscript: Digital recognition / Zaidi Razak
Published 2016“…The literature review in this research looks at works conducted in the past on line and character segmentation as well as recognition systems. The information gathered is useful for the development of a line segmentation algorithm, a new character segmentation algorithm, as well as a recognition algorithm which is based on the use of a unique code and Hamming distance calculation. …”
Get full text
Get full text
Thesis -
13
Effective predicate identification algorithm for XML retrieval
Published 2018Get full text
Get full text
Conference or Workshop Item -
14
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
15
Malay continuous speech recognition using continuous density hidden Markov model
Published 2007“…With their efficient training algorithm (Baum-Welch and Viterbi/Segmental K-mean) and recognition algorithm (Viterbi), as well as it’s modeling flexibility in model topology, observation probability distribution, representation of speech unit and other knowledge sources, HMM has been successfully applied in solving various tasks in this thesis. …”
Get full text
Get full text
Get full text
Thesis -
16
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
Get full text
Get full text
Thesis -
17
A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework
Published 2019“…More effort has been taken in utilizing the data mining and machine learning algorithms to construct anomaly based intrusion detection systems, but the dependency on the learned models that were built based on earlier network behaviour still exists, which restricts those methods in detecting new or unknown intrusions. …”
Get full text
Get full text
Get full text
Article -
18
-
19
A Theoretical Comparative Analysis Of Dna Techniques Used In Dna Based Cryptography
Published 2024Get full text
journal::journal article -
20
Segmenting the right ventricle cavity from 4D echocardiography images for stroke volume measurement
Published 2014“…By reviewing most of the previous work in the literature, there are different methods used to segment the right ventricle (RV) cavity, such as boundary based detection, texture, and regional segmentation methods. …”
Get full text
Get full text
Thesis
