Search Results - (( program segmentation using algorithm ) OR ( java data detection algorithm ))

Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  2. 2

    Development Of Semi-Automatic Liver Segmentation Method For Three-Dimensional Computed Tomography Dataset by Chiang, Yi Fan

    Published 2017
    “…In post-processing, the contour of liver is smooth by binary Gaussian filter. The liver segmentation program with proposed algorithm is evaluated with CT datasets obtained from SLIVER07 to prove its effectiveness in liver segmentation. …”
    Get full text
    Get full text
    Monograph
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  4. 4

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Recognition of isolated elements picture using backpropagation neural network / Melati Sabtu by Sabtu, Melati

    Published 2005
    “…The project used Back-propagation Neural Network for the algorithm to classified images. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Word segmentation of output response for sign language devices by Za'bah, Nor Farahidah, Muhammad Nazmi, Ahmad Amierul Asyraf, Azman, Amelia Wong

    Published 2020
    “…The proposed text segmentation method in this work is by using the dynamic programming and back-off algorithm, together with the probability score using word matching with an English language text corpus. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Interactive blood vessel segmentation from retinal fundus image based on canny edge detector by Ibrahim, Haidi, Ooi, Alexander Ze Hwan, Soo, Siang Teoh, Embong, Zunaina, Abd Hamid, Aini Ismafairus, Zainon, Rafidah, Shir, Li Wang, Theam, Foo Ng, Hamzah, Rostam Affendi

    Published 2021
    “…The program will draw out the vessel edges. After that, those vessel edges will be segmented to bring focus on its details or detect the abnormal vessel. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Accuracy of advanced deep learning with tensorflow and keras for classifying teeth developmental stages in digital panoramic imaging by Norhasmira, Mohammad, Anuar Mikdad, Muad, Rohana, Ahmad, Mohd Yusmiaidil, Putera Mohd Yusof

    Published 2022
    “…Results: Image segmentation using the DP-AC algorithm enhanced the visibility of the image features in the region of interest while suppressing the image’s background noise. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Fast recovery of unknown coefficients in DCT-transformed images by Ong, Sim Ying, Li, Shujun, Wong, Kok Sheik, Tan, Kuan Yew

    Published 2017
    “…In this paper, we propose a fast hierarchical DCT coefficients recovery method by combining image segmentation and linear programming. In theory the proposed method can reduce the overall time complexity by a linear factor which is the number of image segments used. …”
    Get full text
    Get full text
    Article
  15. 15

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    STATISTICAL FEATURE LEARNING THROUGH ENHANCED DELAUNAY CLUSTERING AND ENSEMBLE CLASSIFIERS FOR SKIN LESION SEGMENTATION AND CLASSIFICATION by Adil H., Khan, Dayang Nurfatimah, Awang Iskandar, Jawad F., Al-Asad, SAMIR, EL-NAKLA, SADIQ A., ALHUWAIDI

    Published 2021
    “…A boost ensemble learning algorithm using Support Vector Machines (SVM) as initial classifiers and Artificial Neural Networks (ANN) as a final classifier is employed to learn the patterns of different skin lesion class features. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…In addition, there are no formal methods to be followed to discover the hidden data. For this reason, the task of this paper becomes difficult. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Moving detection using cellular neural network (CNN) by Prema Latha, Subramaniam

    Published 2008
    “…The algorithm created is used to detect the ball in the images. …”
    Get full text
    Get full text
    Undergraduates Project Papers