Search Results - (( knowledge segmentation based algorithm ) OR ( java adaptation optimization algorithm ))
Search alternatives:
- adaptation optimization »
- knowledge segmentation »
- java adaptation »
-
1
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
2
Fuzzy modeling of brain tissues in Bayesian segmentation of brain MR images
Published 2010“…A two-fold fuzzy segmentation algorithm based on Bayesian method is proposed in this paper. …”
Get full text
Get full text
Conference or Workshop Item -
3
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…In this research, a vision system algorithm has been developed to identify and locate base of young corn trees based upon robot vision technology, pattern recognition techniques, and knowledge-based decision theory. …”
Get full text
Get full text
Thesis -
4
-
5
Determination of tree height based on tree crown using algorithm derived from UAV imagery / Suzanah Abdullah ... [et al.]
Published 2021“…The single tree crown was obtained from the digital surface model by using four algorithms such as watershed segmentation, object based image analysis, inverse watershed segmentation and seed generation. …”
Get full text
Get full text
Conference or Workshop Item -
6
-
7
A feature-based approach for segmenting faces
Published 2004“…We identify that the key factor in a generic and robust system is that of using a large amount of image evidence, related and reinforced by model knowledge through a probabilistic framework. In this paper, we propose a feature-based algorithm for segmenting faces that is sufficiently generic and is also easily extensible to cope with more demanding variations of the imaging conditions. …”
Get full text
Get full text
Article -
8
-
9
Coronary artery segmentation in angiograms with pattern recognition techniques - a survey
Published 2013“…But based on our knowledge, there is not any review paper to categorize and compare them together. …”
Get full text
Get full text
Conference or Workshop Item -
10
A Reinforced Active Learning Algorithm for Semantic Segmentation in Complex Imaging
Published 2021“…We propose a new reinforced active learning strategy based on a deep reinforcement learning algorithm. …”
Get full text
Get full text
Article -
11
Old Jawi manuscript: Digital recognition / Zaidi Razak
Published 2016“…The literature review in this research looks at works conducted in the past on line and character segmentation as well as recognition systems. The information gathered is useful for the development of a line segmentation algorithm, a new character segmentation algorithm, as well as a recognition algorithm which is based on the use of a unique code and Hamming distance calculation. …”
Get full text
Get full text
Thesis -
12
Effective predicate identification algorithm for XML retrieval
Published 2018Get full text
Get full text
Conference or Workshop Item -
13
Malay continuous speech recognition using continuous density hidden Markov model
Published 2007“…With their efficient training algorithm (Baum-Welch and Viterbi/Segmental K-mean) and recognition algorithm (Viterbi), as well as it’s modeling flexibility in model topology, observation probability distribution, representation of speech unit and other knowledge sources, HMM has been successfully applied in solving various tasks in this thesis. …”
Get full text
Get full text
Get full text
Thesis -
14
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
Get full text
Get full text
Thesis -
15
A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework
Published 2019“…More effort has been taken in utilizing the data mining and machine learning algorithms to construct anomaly based intrusion detection systems, but the dependency on the learned models that were built based on earlier network behaviour still exists, which restricts those methods in detecting new or unknown intrusions. …”
Get full text
Get full text
Get full text
Article -
16
-
17
A Theoretical Comparative Analysis Of Dna Techniques Used In Dna Based Cryptography
Published 2024Get full text
journal::journal article -
18
Segmenting the right ventricle cavity from 4D echocardiography images for stroke volume measurement
Published 2014“…By reviewing most of the previous work in the literature, there are different methods used to segment the right ventricle (RV) cavity, such as boundary based detection, texture, and regional segmentation methods. …”
Get full text
Get full text
Thesis -
19
Exploiting Bayesian belief network for adaptive IP-reuse decision
Published 2009“…This paper presents a novel fully automatic hybrid framework that combines heuristic and knowledge-based approaches to partition, allocate and schedule IP modules efficiently. …”
Get full text
Get full text
Get full text
Proceeding Paper -
20
Estimating tree height based on tree crown from UAV imagery / Suzanah Abdullah ... [et al.]
Published 2022“…Subsequently, the tree height has been calculated based on the tree crown extraction. As a conclusion, this study has contributed to the knowledge extension in this area and presented the result of the tree height values according to the segmentation algorithm at the different flying height data.…”
Get full text
Get full text
Get full text
Article
