Search Results - (( semantics segmentation using algorithm ) OR ( java implementation developing algorithm ))

Refine Results
  1. 1

    Segmentation of pulmonary cavity in lung CT scan for tuberculosis disease by Tan, Zhuoyi, Madzin, Hizmawati, Khalid, Fatimah, Beng, Ng Seng

    Published 2024
    “…Then, based on this threshold, the lesion tissue within the bounding box is extracted and forms a mask that can be used for semantic segmentation tasks. Finally, we use the generated TB semantic segmentation mask to train Unet and Vnet models to verify the effectiveness of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    A Reinforced Active Learning Algorithm for Semantic Segmentation in Complex Imaging by Usmani, U.A., Watada, J., Jaafar, J., Aziz, I.A., Roy, A.

    Published 2021
    “…Second, the datasets taken for the semantic segmentation task are not balanced since certain classes are present more than the others. …”
    Get full text
    Get full text
    Article
  3. 3

    Hybrid Region Merging For Image Segmentation Using Optimal Global Feature With Global Merging Criterion Approach by Vadiveloo, Mogana

    Published 2020
    “…Region merging approach is used to reduce over segmented regions produced by region-based image segmentation algorithms. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    An Optimized Semantic Segmentation Framework for Human Skin Detection by Huong, Audrey, Ngu, Xavier

    Published 2024
    “…The study incorporating optimization strategy in semantic segmentation is underexplored in dermatology. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Modelling semantic context for novelty detection in wildlife scenes by Yong, SP, Deng, JD, Purvis, MP

    Published 2010
    “…Working with wildlife image data, the framework starts with image segmentation, followed by feature extraction and classification of the image blocks extracted from image segments. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  9. 9
  10. 10

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A novel deep learning instance segmentation model for automated marine oil spill detection by Temitope Yekeen, S., Balogun, A.L., Wan Yusof, K.B.

    Published 2020
    “…So far, detection and discrimination of oil spill and look-alike are still limited to the use of traditional machine learning algorithms and semantic segmentation deep learning models with limited accuracy. …”
    Get full text
    Get full text
    Article
  13. 13

    A novel deep learning instance segmentation model for automated marine oil spill detection by Temitope Yekeen, S., Balogun, A.L., Wan Yusof, K.B.

    Published 2020
    “…So far, detection and discrimination of oil spill and look-alike are still limited to the use of traditional machine learning algorithms and semantic segmentation deep learning models with limited accuracy. …”
    Get full text
    Get full text
    Article
  14. 14

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…The method employs Semantic Tags Extraction (STSE) algorithm to extract semantic tags of an element and Element Enrichment (EERM) algorithm to enrich the elements. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Enhanced Deep Learning Framework for Fine-Grained Segmentation of Fashion and Apparel by Usmani, U.A., Happonen, A., Watada, J.

    Published 2022
    “…The low-level feature data are extracted by the feature extraction module using Mask Region Convolutional Neural Network (RCNN) segmentation branches and Inception V3 used to extract the high-level semantic data. …”
    Get full text
    Get full text
    Article
  17. 17

    Deep learning semantic segmentation for water level estimation using surveillance camera by Muhadi, Nur 'Atirah, Abdullah, Ahmad Fikri, Bejo, Siti Khairunniza, Mahadi @ Othman, Muhammad Razif, Mijic, Ana

    Published 2021
    “…This work presented two well-established deep learning algorithms, DeepLabv3+ and SegNet networks, and evaluated their performances using several evaluation metrics. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Enhanced Reinforcement Learning Model for Extraction of Objects in Complex Imaging by Usmani, U.A., Roy, A., Watada, J., Jaafar, J., Aziz, I.A.

    Published 2022
    “…The visualization and classification of the area of interest in any picture is therefore an important function in order to segment the image. We examine a variety of image segmentation algorithms and give our reinforcement learning algorithm that uses Deep Convolutional Neural Networks for the detection of irregular objects, which has been tested on four datasets. …”
    Get full text
    Get full text
    Article
  19. 19

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The aim of the thesis is to provide an overview of the ABS encryptiOn algorithm, to develop a prototype that is implemented for communication purpose, and to test the developed prototype in terms of accuracy purpose. …”
    Get full text
    Get full text
    Undergraduates Project Papers