Search Results - (( java implementing function algorithm ) OR ( post segmentation using algorithm ))
Search alternatives:
- implementing function »
- function algorithm »
- java implementing »
- post segmentation »
- using algorithm »
-
1
Segmentation of MRI brain images using statistical approaches
Published 2011“…The Gaussian Mixture Model (GMM) is a clustering algorithm that is commonly used for brain MRI segmentation. …”
Get full text
Get full text
Thesis -
2
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…The prototypes will be developed using JAVA language united with a MySQL database. Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
Get full text
Get full text
Final Year Project -
3
Development Of Semi-Automatic Liver Segmentation Method For Three-Dimensional Computed Tomography Dataset
Published 2017“…The liver segmentation program with proposed algorithm is evaluated with CT datasets obtained from SLIVER07 to prove its effectiveness in liver segmentation. …”
Get full text
Get full text
Monograph -
4
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
5
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020“…PHPMyAdmin is used to store the dataset and also acts as a database for user information. The algorithm chosen was implemented using Java Programming language and was tested using Root Means Square Error (RMSE) formula.…”
Get full text
Get full text
Thesis -
7
Songs Search Using Human Humming Voice
Published 2007“…The system has the functionality of humming voice recording and algorithms comparing both humming voice and song files in the system to fmd the right song. …”
Get full text
Get full text
Final Year Project -
8
Stereo matching algorithm using census transform and segment tree for depth estimation
Published 2023“…Fundamentally, the framework input is the stereo image which represents left and right images respectively. The proposed algorithm in this article has four steps in total, which starts with the matching cost computation using census transform, cost aggregation utilizes segment-tree, optimization using winner-takes-all (WTA) strategy, and post-processing stage uses weighted median filter. …”
Get full text
Get full text
Get full text
Article -
9
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
Get full text
Get full text
Conference or Workshop Item -
10
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…E-Certificate helps eliminate many problems that is associated with physical printed certificate such costs, management, and forgery problem. Even though implementation of such E-Certificate have been implemented around the globe, it has not been implemented for workshops in UiTM. …”
Get full text
Get full text
Thesis -
11
Human body electromagnetic radiation: the physiological characteristic for post stroke patients / Ros Shilawani S. Abdul Kadir
Published 2018“…This finding confirmed that the EMR of human body has different characteristics between samples of post stroke and non-stroke and between their body segments.…”
Get full text
Get full text
Thesis -
12
Drone Based Image Processing For Precision Agriculture
Published 2019“…Post K-means clustering, the diseased portions of the plants were assessed using Hue-Saturation-Value (HSV) based image segmentation algorithm. …”
Get full text
Get full text
Monograph -
13
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
Get full text
Get full text
Thesis -
14
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis -
15
Moment-based extraction on handwritten digits
Published 2005“…Classification and recognition results are analyzed to determine the necessity of operation thinning when dealing with the moment functions. A Simple Block Segmentation with Moore Tracing Algorithm (SBS & MNTA) is used in image segmentation while Safe-point Thinning Algorithm (SPTA) is applied in image thinning process. …”
Get full text
Get full text
Monograph -
16
Spectral texture segmentation of Magnetic Resonance Imaging (MRI) brain images for glioma brain tumour detection / Rosniza Roslan
Published 2013“…Experiments conducted on 64 MRI images, of all sequences showed that texture energy is the best texture feature to be used in glioma segmentation. Fuzzy C-Means clustering algorithm is then used to segment texture energy features from 126 MRI brain images of all sequences. …”
Get full text
Get full text
Thesis -
17
Image Segmentation using Enhanced K-means Clustering with Hybrid Image Filtering for Acute Leukemia Blood Cells Microscopic Images
Published 2024thesis::master thesis -
18
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
Get full text
Get full text
Get full text
Article -
19
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. The image clustering is major part of data mining where study about how to binds the similar data together in a cluster and show the meaningful data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
An object-based approach to detect tree stumps in a selective logging area using Unmanned Aerial Vehicle imagery
Published 2021“…This research implemented a technique for detecting, segmenting, classifying, and measuring tree stumps by using the Multiresolution Segmentation Algorithm method. …”
Get full text
Get full text
Get full text
Article
