Search alternatives:
extraction algorithm » detection algorithm (Expand Search), encryption algorithm (Expand Search), detection algorithms (Expand Search)
process optimization » model optimization (Expand Search)
image process » damage process (Expand Search), image processing (Expand Search), simple process (Expand Search)
data feature » data figure (Expand Search), each feature (Expand Search), a feature (Expand Search)
binary data » primary data (Expand Search), dietary data (Expand Search)
extraction algorithm » detection algorithm (Expand Search), encryption algorithm (Expand Search), detection algorithms (Expand Search)
process optimization » model optimization (Expand Search)
image process » damage process (Expand Search), image processing (Expand Search), simple process (Expand Search)
data feature » data figure (Expand Search), each feature (Expand Search), a feature (Expand Search)
binary data » primary data (Expand Search), dietary data (Expand Search)
-
1
-
2
-
3
-
4
Improved support vector machine classification algorithm based on adaptive feature weight updating in the Hadoop cluster environment
Published 2019“…The MapReduce parallel programming model on the Hadoop platform is used to perform an adaptive fusion of hue, local binary pattern (LBP) and scale-invariant feature transform (SIFT) features extracted from images to derive optimal combinations of weights. …”
-
5
-
6
-
7
-
8
-
9
Image processing workflow.
Published 2020“…<p>Raw fluorescent microscope images (a) were processed with a binary segmentation algorithm, and clusters of bacterial cells were manually annotated. …”
-
10
A* Path-Finding Algorithm to Determine Cell Connections
Published 2025“…</p><p dir="ltr">Astrocytes were dissociated from E18 mouse cortical tissue, and image data were processed using a Cellpose 2.0 model to mask nuclei. …”
-
11
-
12
-
13
-
14
Melanoma Skin Cancer Detection Using Deep Learning Methods and Binary GWO Algorithm
Published 2025“…This strategy </p><p dir="ltr">not only improves detection efficiency and accuracy but also supports early diagnosis and treatment planning, </p><p dir="ltr">leading to better patient outcomes. By leveraging the binary GWO algorithm to optimize the feature selection </p><p dir="ltr">process and CNNs for image classification, the proposed approach reduces computational costs while increasing </p><p dir="ltr">classification accuracy. …”
-
15
-
16
-
17
-
18
-
19
-
20
Optimized Bayesian regularization-back propagation neural network using data-driven intrusion detection system in Internet of Things
Published 2025“…The extracted features are fed into Bayesian Regularization-Back Propagation Neural Network (BRBPNN) which detects the intrusion as Ransomware, Password attack, Scanning, Denial of Service (DoS), Distributed Denial of Service (DDoS), Data injection, Backdoor, Cross-Site Scripting (XSS), and Man-In-The-Middle (MITM). …”