Search Results - (( process segmentation mining algorithm ) OR ( java application system algorithm ))
Search alternatives:
- process segmentation »
- segmentation mining »
- mining algorithm »
- java application »
- system algorithm »
-
1
Development of a new algorithm for segmentation of flotation froth images
Published 2014Get full text
Get full text
Article -
2
The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment
Published 2007“…Region growing segmentation and radial basis function algorithms are considered a powerful tool to minimize the mixed pixel classification error.…”
Get full text
Get full text
Conference or Workshop Item -
3
Denoising histological images for a better colour image segmentation / Sulastri Putit
Published 2013“…According to (Pierrick Coupe et.al, 2008), image de-noising is used to improve the accuracy of various image processing algorithms such as registration or segmentation. …”
Get full text
Get full text
Thesis -
4
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…On the other hand, trajectories preprocessing such as segmentation and noise points filtering is a vital step which precedes the mining task. …”
Get full text
Get full text
Thesis -
5
-
6
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
7
-
8
Analysis Of Failure In Offline English Alphabet Recognition With Data Mining Approach
Published 2019“…However, these approaches involve complex algorithms and require voluminous dataset as the training model. …”
Get full text
Get full text
Monograph -
9
Intuitive Content Management System to Preferences Template Throughout Data Collection by using Data Mining Classification of Prediction Method
Published 2016“…The sophisticated mathematical algorithm applies in data mining to segment data and evaluates the probability of a future event. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Real-time algorithmic music composition application.
Published 2022“…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
12
Improvement on rooftop classification of worldview-3 imagery using object-based image analysis
Published 2019“…Then, the classifier (support vector machine (SVM) and data mining (DM) algorithm, decision tree (DT) were applied on each fusion image and their accuracy were evaluated. …”
Get full text
Get full text
Thesis -
13
Data mining and analysis for predicting electrical energy consumption
Published 2024“…This classification was done using data mining (five algorithms in specific) and data analysis theory. …”
Article -
14
-
15
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
16
-
17
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
18
A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework
Published 2019“…Several logs from multiple sources are used as input and this data are processed by all the modules of the framework. As each segment is instrumented for a particular undertaking towards a definitive objective, the commitment of each segment towards abnormality recognition is estimated with various execution measurements. …”
Get full text
Get full text
Get full text
Article -
19
-
20
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item
