Showing 1 - 20 results of 74 for search '(( binary data feature extraction algorithm ) OR ( binary image process optimization algorithm ))', query time: 0.49s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Improved support vector machine classification algorithm based on adaptive feature weight updating in the Hadoop cluster environment by Jianfang Cao (1881379)

    Published 2019
    “…The MapReduce parallel programming model on the Hadoop platform is used to perform an adaptive fusion of hue, local binary pattern (LBP) and scale-invariant feature transform (SIFT) features extracted from images to derive optimal combinations of weights. …”
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    Image processing workflow. by Denis Tamiev (7404980)

    Published 2020
    “…<p>Raw fluorescent microscope images (a) were processed with a binary segmentation algorithm, and clusters of bacterial cells were manually annotated. …”
  10. 10

    A* Path-Finding Algorithm to Determine Cell Connections by Max Weng (22327159)

    Published 2025
    “…</p><p dir="ltr">Astrocytes were dissociated from E18 mouse cortical tissue, and image data were processed using a Cellpose 2.0 model to mask nuclei. …”
  11. 11
  12. 12
  13. 13
  14. 14

    Melanoma Skin Cancer Detection Using Deep Learning Methods and Binary GWO Algorithm by Hussein Ali Bardan (21976208)

    Published 2025
    “…This strategy </p><p dir="ltr">not only improves detection efficiency and accuracy but also supports early diagnosis and treatment planning, </p><p dir="ltr">leading to better patient outcomes. By leveraging the binary GWO algorithm to optimize the feature selection </p><p dir="ltr">process and CNNs for image classification, the proposed approach reduces computational costs while increasing </p><p dir="ltr">classification accuracy. …”
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

    Optimized Bayesian regularization-back propagation neural network using data-driven intrusion detection system in Internet of Things by Ashok Kumar K (21441108)

    Published 2025
    “…The extracted features are fed into Bayesian Regularization-Back Propagation Neural Network (BRBPNN) which detects the intrusion as Ransomware, Password attack, Scanning, Denial of Service (DoS), Distributed Denial of Service (DDoS), Data injection, Backdoor, Cross-Site Scripting (XSS), and Man-In-The-Middle (MITM). …”