Search Results - (( java location based algorithm ) OR ( knowledge segmentation models algorithm ))
Search alternatives:
- knowledge segmentation »
- segmentation models »
- models algorithm »
- java »
-
1
Fuzzy modeling of brain tissues in Bayesian segmentation of brain MR images
Published 2010Get full text
Get full text
Conference or Workshop Item -
2
A Reinforced Active Learning Algorithm for Semantic Segmentation in Complex Imaging
Published 2021“…The decision on the area of selection is dependent on the assumptions and segmentation model uncertainties taken for training purposes. …”
Get full text
Get full text
Article -
3
Determination of tree height based on tree crown using algorithm derived from UAV imagery / Suzanah Abdullah ... [et al.]
Published 2021“…The single tree crown was obtained from the digital surface model by using four algorithms such as watershed segmentation, object based image analysis, inverse watershed segmentation and seed generation. …”
Get full text
Get full text
Conference or Workshop Item -
4
Malay continuous speech recognition using continuous density hidden Markov model
Published 2007“…HMM is a robust and powerful technique capable of modeling of speech signals. With their efficient training algorithm (Baum-Welch and Viterbi/Segmental K-mean) and recognition algorithm (Viterbi), as well as it’s modeling flexibility in model topology, observation probability distribution, representation of speech unit and other knowledge sources, HMM has been successfully applied in solving various tasks in this thesis. …”
Get full text
Get full text
Get full text
Thesis -
5
A feature-based approach for segmenting faces
Published 2004“…We identify that the key factor in a generic and robust system is that of using a large amount of image evidence, related and reinforced by model knowledge through a probabilistic framework. …”
Get full text
Get full text
Article -
6
-
7
Group formation using genetic algorithm
Published 2009“…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
8
Coronary artery segmentation in angiograms with pattern recognition techniques - a survey
Published 2013“…Coronary artery segmentation algorithm in angiograms is a fundamental component of each cardiac image processing system. …”
Get full text
Get full text
Conference or Workshop Item -
9
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
Get full text
Get full text
Thesis -
10
Segmenting microcalcifications using enhanced distance active contour (EDAC) / Siti Salmah Yasiran
Published 2010“…This study sets out to explore the Active Contour models to segment object boundaries using the Distance Active Contour (DAC) method. …”
Get full text
Get full text
Thesis -
11
-
12
Automated Detection and Classification of Retinal Vein Occlusion Using Ultra-widefield Retinal Fundus Images and Transfer Learning
Published 2024“…The approach seeks to utilise knowledge from pretraining to enhance the performance of the segmentation model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Existing literature relies on offline trained models or incremental learning models. The former suffers from partially or fully outdated knowledge after drift occurrence, and the latter suffers from the constraints of the pre-defined hyper-parameter of the model. …”
Get full text
Get full text
Thesis -
14
A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework
Published 2019“…More effort has been taken in utilizing the data mining and machine learning algorithms to construct anomaly based intrusion detection systems, but the dependency on the learned models that were built based on earlier network behaviour still exists, which restricts those methods in detecting new or unknown intrusions. …”
Get full text
Get full text
Get full text
Article -
15
Segmenting the right ventricle cavity from 4D echocardiography images for stroke volume measurement
Published 2014“…Comparisons of the segmentation, End-Diastolic and End-Systolic stages, stroke volume and the reconstructed 3D model; are provided with currently available software for left ventricle volume, function assessment and 3D modelling to validate the merit of the proposed work. …”
Get full text
Get full text
Thesis -
16
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
18
Analysis Of Failure In Offline English Alphabet Recognition With Data Mining Approach
Published 2019“…However, these approaches involve complex algorithms and require voluminous dataset as the training model. …”
Get full text
Get full text
Monograph -
19
EEG-based biometric authentication modelling using incremental fuzzy-rough nearest neighbour technique
Published 2018“…Signal pre-processingsteps on segmentation, filtering and artefact rejection were carried out to improve the data quality before model building. …”
Get full text
Get full text
Article -
20
Evaluating endpoint detection algorithms for isolated word from Malay parliamentary speech
Published 2023Conference paper
