Search Results - (( java implication based algorithm ) OR ( based perspective modified algorithm ))

  • Showing 1 - 12 results of 12
Refine Results
  1. 1

    Investigation Of Edge Detection Techniques Based On Brain Tumor Images by Rosnan, Murni Nur Athirah

    Published 2018
    “…However, from visual perspective, Sobel operator produced better edge maps of the brain tumor compared to the Modified Canny algorithm.…”
    Get full text
    Get full text
    Monograph
  2. 2
  3. 3
  4. 4

    A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm by Ba-Quttayyan, Bakr Salim Abdullah

    Published 2024
    “…The developed framework, grounded in fault-based testing theory, comprises three key components: inputs, prioritization factors, and a prioritization algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    The Perspective Classification of Balanced Scorecard with Ontology Technique by Kaewninprasert, Kittisak, Chai-Arayalert, Supaporn, Yamaqupta, Narueban

    Published 2024
    “…The accuracy rate of the PCBSC-Onto framework is 82.97% when compared to the accuracy of the modified Delphi method. The results reveal the accuracy of the proposed ontologies and algorithms on the data from the case study…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A modified weighted support vector machine (WSVM) to reduce noise data in classification problem by Mohd Dzulkifli, Syarizul Amri

    Published 2021
    “…To overcome SVM drawback for noise data problem, WSVM using KPCM algorithm was used but WSVM using kernel-based learning algorithm such as KPCM algorithm suffer from training complexity, expensive computation time and storage memory when noise data contaminate training data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    A modified weighted support vector machine (WSVM) to reduce noise data in classification problem by Mohd Dzulkifli, Syarizul Amri

    Published 2021
    “…To overcome SVM drawback for noise data problem, WSVM using KPCM algorithm was used but WSVM using kernel-based learning algorithm such as KPCM algorithm suffer from training complexity, expensive computation time and storage memory when noise data contaminate training data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Process Planning Optimization In Reconfigurable Manufacturing Systems by Musharavati, Farayi

    Published 2008
    “…The five (5) AADTs include; a variant of the simulated annealing algorithm that implements heuristic knowledge at critical decision points, two (2) cooperative search schemes based on a “loose hybridization” of the Boltzmann Machine algorithm with (i) simulated annealing, and (ii) genetic algorithm search techniques, and two (2) modified genetic algorithms. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    A Novel Hybrid Deep Learning Model Based on Simulated Annealing and Cuckoo Search Algorithms for Automatic Radiomics-Based COVID-19 Diagnosis by Saleh, Basma Jumaa, Omar, Zaid, As’ari, Muhammad Amir, Bhateja, Vikrant, Izhar, Lila Iznita

    Published 2025
    “…To address this, we propose an efficient, modified radiomics feature processing method that integrates an optimal aerial perspective (OAP) parameter-based intensity dark channel prior (IDCP) with a 50-layer residual deep neural network (ResNet50 DNN) for autolesion segmentation (ALS-IOAP-DNN). …”
    Get full text
    Get full text
    Article
  11. 11

    Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil by Shahrul Kamil, Aiman Nurrasyid

    Published 2020
    “…The vulnerabilities in BLE 4.2 and 5.x add an attractive perspective to the security of IoT technology. The issue of providing end-toend data protection should has been given highest priority by IoT application developer because the data in both private and public networks can be modified and disrupted by attacker. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A fuzzy approach for early human action detection / Ekta Vats by Ekta, Vats

    Published 2016
    “…However, the employability of these algorithms depends on the desired application and its requirements. …”
    Get full text
    Get full text
    Thesis