Search Results - (( simultaneous segmentation using algorithm ) OR ( java implementation some algorithm ))
Search alternatives:
- simultaneous segmentation »
- java implementation »
- implementation some »
- using algorithm »
- some algorithm »
-
1
Image enhancement and segmentation on simultaneous latent fingerprint detection
Published 2015“…This thesis presents an algorithm to segment individual fingerprints for SLF image. …”
Get full text
Get full text
Thesis -
2
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
3
-
4
Segmentation of Lung Region in Computed Tomography (CT) Images
Published 2015“…In this work, a lung segmentation algorithm for CT images is proposed and evaluated. …”
Get full text
Get full text
Final Year Project -
5
Computer-aided acute leukemia blast cells segmentation in peripheral blood images
Published 2015“…Although numerous blast cells segmentation methods have been developed, only few studies attempted to address these problems simultaneously. …”
Get full text
Article -
6
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
7
Efficient hardware design for palm-dorsa vein image enhancement
Published 2018“…Then, segmentation technique consisting of Difference of Gaussian and threshold are used to segment the veins. …”
Get full text
Get full text
Get full text
Thesis -
8
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
9
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
10
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
11
-
12
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
13
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis -
14
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
A Reinforcement Learning Based Adaptive ROI Generation for Video Object Segmentation
Published 2021“…The proposed method has been validated using four commonly used video entity segmentation datasets: SegTrack V2, DAVIS 2016, CdNet 2014, and the Youtube-Object dataset. …”
Get full text
Get full text
Article -
16
Hybrid Balance Artificial Potential Field Navigation System For An Autonomous Surface Vessel In Riverine Environment
Published 2019“…In order to overcome these issues, a Color Segmentation Constrained Hough Transform Algorithm is proposed. …”
Get full text
Get full text
Thesis -
17
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
18
New Algorithm of Location Model based on Robust Estimators and Smoothing Approach
Published 2017Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Development of new code for optical code division multiple access systems
Published 2011“…The overall code sequences are divided into two parts: code and data segments. These codes sequences having zero and variable cross-correlation at data segment and code segment, respectively. …”
Get full text
Thesis -
20
A NOVEL FORWARD BACKWARD LINEAR PREDICTION ALGORITHM FOR SHORT TERM POWER LOAD FORECAST
Published 2010“…The proposed AR-based algorithm divides long data record into short segments and searches for the AR coefficients that simultaneously model the data with the least means squared errors. …”
Get full text
Get full text
Thesis
