Search Results - (( java application during algorithm ) OR ( parameter segmentation clustering algorithm ))

Refine Results
  1. 1

    Individual-tree segmentation and extraction based on LiDAR point cloud data by Liu, Xiaofeng, Abdullah, Muhamad Taufik, Mustaffa, Mas Rina, Nasharuddin, Nurul Amelina

    Published 2024
    “…Utilizing LiDAR point cloud data and ground-measured data from 30 plots, we examined the sensitivity of individual tree segmentation to key parameters by varying the grid values of the point cloud distance discriminant clustering algorithm and adjusting the canopy height resolution (CHR) of the watershed algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Automatic Segmentation and Classification of Skin Lesions in Dermoscopic Images by Adil Humayun, Khan

    Published 2024
    “…The second segmentation algorithm combines Delaunay triangulation clustering in the spatial domain and Particle Swarm Optimization (PSO). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Model-based hybrid variational level set method applied to lung cancer detection by Jing, Wang, Liew, Siau-Chuin, Azian, Abd Aziz

    Published 2024
    “…Initially, the VLSM introduces a scale-adaptive fast level-set image segmentation algorithm to address the inefficiency of low gray scale image segmentation. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Cauchy density-based algorithm for VANETs clustering in 3D road environments by Jubair, Mohammed Ahmed, Ahmad, Mohd Riduan, Abdul Aziz, Izzatdin, Al-Obaidi, Ahmed Salih, Al-Tickriti, Abdullah Talaat, Hassan, Mustafa Hamid, Mostafa, Salama A., Mahdin, Hairulnizam

    Published 2022
    “…Clustering algorithms for VANETs operate in a decentralized mode, which requires incorporating additional stages before deciding the clustering decisions and might create sub-optimality due to the local nature of the decentralized approach. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Using Bimodal Gaussian Mixture Model-Based Algorithm for Background Segmentation in Thermal Fever Mass Screening by Siti Sofiah, Mohd Radzi, Kamarul Hawari, Ghazali, Nazriyah, Che Zan, Faradila, Naim

    Published 2011
    “…To estimate the bi - modal background-foreground distribution mixture parameters, Expectation-Maximization (EM) algorithm is applied and the images are clustered statistically and linearly. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Data stream clustering by divide and conquer approach based on vector model by Khalilian, Madjid, Mustapha, Norwati, Sulaiman, Nasir

    Published 2016
    “…The continuous effort on data stream clustering method has one common goal which is to achieve an accurate clustering algorithm. …”
    Get full text
    Get full text
    Article
  8. 8

    Model-based hybrid variational level set method applied to object detection in grey scale images by Wang, Jing

    Published 2024
    “…In industrial inspection, segmentation algorithms detect product defects, cracks, or anomalies for quality control and safety. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Hence, the algorithm must overcome the problem of dynamic updates in the internal parameters or counter the concept drift. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Extracting crown morphology with a low-cost mobile LiDAR scanning system in the natural environment by Wang, Kai, Zhou, Jun, Zhang, Wenhai, Zhang, Baohua

    Published 2021
    “…After using the RANSAC algorithm to remove the map ground, the European clustering algorithm is used for point cloud segmentation. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13

    Analytical framework for predicting online purchasing behavior in Malaysia using a machine learning approach by Mustakim, Nurul Ain

    Published 2025
    “…The framework uses machine learning methods, including classification, clustering, feature selection, and parameter tuning, to improve accuracy and reliability. …”
    Get full text
    Get full text
    Thesis
  14. 14

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Feature extraction and classification :a case study of classifying a simulated digital mammogram images using self-organizing maps (som) by Lau, Leh Teen.

    Published 2007
    “…This feature extraction technique can be used to find five parameters which are the size, intensity, centroid X, centroid Y and region distribution of segmented regions . …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  16. 16

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  17. 17
  18. 18
  19. 19

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis