Search Results - (( simultaneously segmentation method algorithm ) OR ( java implementation learning algorithm ))

  • Showing 1 - 19 results of 19
Refine Results
  1. 1

    Image enhancement and segmentation on simultaneous latent fingerprint detection by Rozita, Mohd Yusof

    Published 2015
    “…Segmentation of 240 images is performed and compared with manual segmentation methods. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Segmentation of Lung Region in Computed Tomography (CT) Images by Mohd Bokeri, Husna Adila

    Published 2015
    “…In this work, a lung segmentation algorithm for CT images is proposed and evaluated. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Computer-aided acute leukemia blast cells segmentation in peripheral blood images by Madhloom, H.T., Kareem, S.A., Ariffin, H.

    Published 2015
    “…Although numerous blast cells segmentation methods have been developed, only few studies attempted to address these problems simultaneously. …”
    Get full text
    Article
  5. 5

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Hybrid Balance Artificial Potential Field Navigation System For An Autonomous Surface Vessel In Riverine Environment by Jianhong, Mei

    Published 2019
    “…In order to overcome these issues, a Color Segmentation Constrained Hough Transform Algorithm is proposed. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    A Reinforcement Learning Based Adaptive ROI Generation for Video Object Segmentation by Usmani, U.A., Watada, J., Jaafar, J., Aziz, I.A., Roy, A.

    Published 2021
    “…The proposed method has been validated using four commonly used video entity segmentation datasets: SegTrack V2, DAVIS 2016, CdNet 2014, and the Youtube-Object dataset. …”
    Get full text
    Get full text
    Article
  10. 10

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Detection and Severity Identification of control valve stiction in industrial loops using integrated partially retrained CNN-PCA frameworks by YAU, YONG SONG

    Published 2021
    “…Recent neural network based stiction detection methods published are only able to perform either stiction detection or quantification, which open up an area of research to propose a simplified algorithm to simultaneously detect and quantify stiction with high generalization capability. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Development of new code for optical code division multiple access systems by Hilal Adnan, Fadhil

    Published 2011
    “…The overall code sequences are divided into two parts: code and data segments. These codes sequences having zero and variable cross-correlation at data segment and code segment, respectively. …”
    Get full text
    Thesis
  14. 14

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  15. 15

    Image Based Oil Palm Tree Crowns Detection by Muhammad Afif Zakwan, Zaili

    Published 2020
    “…Otsu Threshold and Gaussian Filter is used to reduce the noise of the image by turn it to black and white. Canny edge segmentation algorithm is used after that to determine the edge of the crowns by differentiate the end of object and background. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  16. 16
  17. 17

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    On-orbit spatial image characterisation and restoration based on stochastic characteristic targets / Wong Soo Mee by Wong , Soo Mee

    Published 2021
    “…In particular, first, it proposes a segmentation method to select the ideal candidates for MTF Measurement. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis