نتایج جستجو برای: cmeans

تعداد نتایج: 155  

در این مقاله برای جداسازی کور منابع گفتار کانولوتیو، یک روش ماسک زمان- فرکانس بر اساس مفهوم زاویه هرمیشن ارائه شده است. زاویه هرمیشن بین بردار ترکیب (خروجی میکروفون‌ها) و بردار مرجع محاسبه می‌شود. در این مقاله ابتدا دو بردار مرجع مختلف برای محاسبه دو زاویه هرمیشن متفاوت فرض شده، سپس این زوایا با استفاده از روش‌های k-means و fuzzy-cmeans خوشه‌بندی می‌شود. مسئله جایگشت منابع، بر اساس خوشه‌بندیk-m...

Nowadays, the Fuzzy C-Means method has become one of the most popular clustering methods based on minimization of a criterion function. However, the performance of this clustering algorithm may be significantly degraded in the presence of noise. This paper presents a robust clustering algorithm called Bilateral Weighted Fuzzy CMeans (BWFCM). We used a new objective function that uses some k...

2005
Alan Wee-Chung Liew Hong Yan

Accurate segmentation of magnetic resonance (MR) images of the brain is of interest in the study of many brain disorders. In this paper, we provide a review of some of the current approaches in the tissue segmentation of MR brain images. We broadly divided current MR brain image segmentation algorithms into three categories: classificationbased, region-based, and contour-based, and discuss the ...

2002
Daniele Peri Edoardo Ardizzone Roberto Pirrone Orazio Gambino

A novel approach to the detection of multiple sclerosis (MS) lesions in T2and PD-weighted MR images is presented. The core of the proposed method is the use of the two channels fuzzy cmeans (FCM) segmentation of data, where the classical FCM approach runs, at first, on the two separate spectra. Then, the onedimensional distributions of the clusters centers obtained by FCM, are composed in the t...

Journal: :Journal of Systems Architecture - Embedded Systems Design 2015
Xiaojun Zhai Kofi Appiah Shoaib Ehsan W. Gareth J. Howells Huosheng Hu Dongbing Gu Klaus D. McDonald-Maier

Execution of unknown or malicious software on an embedded system may trigger harmful system behaviour targeted at stealing sensitive data and/or causing damage to the system. It is thus considered a potential and significant threat to the security of embedded systems. Generally, the resource constrained nature of Commercial off-the-shelf (COTS) embedded devices, such as embedded medical equipme...

2016
ASSAS Ouarda

With the development of acquisition image techniques, more data coming from different sources of image become available. Multi-modality image fusion seeks to combine information from different images to obtain more inferences than can be derived from a single modality. The main aim of this work is to improve cerebral IRM real images segmentation by fusion of modalities (T1, T2 and DP) using Fuz...

2016
Ritu Agrawal Manisha Sharma

Telemedicine is a general practice among remote areas. There is a chance of modifying in medical images intentionally or accidently if transmitted through open network. The medical practitioner has to verify region of interest (ROI), the diagnosis area of the received medical images before rendering any decision report. In this paper, a medical image watermarking scheme using DCT domain is disc...

2014
Jemila Rose

Dermoscopy is one of the major imaging aspects used in the skin lesions. This paper presentsa new tacticfor the segmentation of skin abrasionsin dermoscopic images based on fuzzy Cmeans algorithm learned wavelet network (WN). The WN offeredhere is a member of fixed-grid WNs that is designedwith no requirementof training. Fuzzy C-means techniqueis used to enhancethe network structure. In additio...

2006
Ahmed M. Badawi Mohamed Mahfouz Rimon Tadross Richard Jantz

Gender classification from fingerprints is an important step in forensic anthropology in order to identify the gender of a criminal and minimize the list of suspects search. A dataset of 10-fingerprint images for 2200 persons of different ages and gender (1100 males and 1100 females) was analyzed. Features extracted were; ridge count, ridge thickness to valley thickness ratio (RTVTR), white lin...

ژورنال: :روش های هوشمند در صنعت برق 2013
عاطفه سلطانی سید حمید محمودیان علی هاشمی

در این مقاله برای جداسازی کور منابع گفتار کانولوتیو، یک روش ماسک زمان- فرکانس بر اساس مفهوم زاویه هرمیشن ارائه شده است. زاویه هرمیشن بین بردار ترکیب (خروجی میکروفون ها) و بردار مرجع محاسبه می شود. در این مقاله ابتدا دو بردار مرجع مختلف برای محاسبه دو زاویه هرمیشن متفاوت فرض شده، سپس این زوایا با استفاده از روش های k-means و fuzzy-cmeans خوشه بندی می شود. مسئله جایگشت منابع، بر اساس خوشه بندیk-m...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید