Search Results - (( automatic identification problems algorithm ) OR ( java application system algorithm ))
Search alternatives:
- identification problems »
- java application »
- system algorithm »
-
1
-
2
-
3
Fingerprint feature extraction based discrete cosine transformation (DCT)
Published 2009“…In this paper, a simple and effectiveness algorithm is proposed for fingerprint image recognition and the proposed algorithm is able to solve the problem discussed above. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
4
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
5
Automatic identification of epileptic seizures from EEG signals using sparse representation-based classification
Published 2020“…A computerized seizure identification scheme can eradicate the above problems, assist clinicians, and benefit epilepsy research. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
6
-
7
CORROSION DAMAGE ANALYSIS USING IMAGE PROCESSING
Published 2018“…There is a need to develop a low cost automatic corrosion damage identification. This project focuses on early detection of pipelines and gas tanks corrosion in oil and gas. …”
Get full text
Get full text
Final Year Project -
8
Advances in automatic insect classification
Published 2014“…There have been several attempts to create a method to perform insect identification accurately. Great knowledge and experience on entomology are required for accurate insect identification. …”
Get full text
Get full text
Get full text
Article -
9
Real-time algorithmic music composition application.
Published 2022“…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
11
-
12
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
13
-
14
Simulated real-time controller for tuning algorithm using modified hill climbing approach
Published 2014“…That led to new ways to tackle old problems like model inaccuracies and inconsistencies. …”
Get full text
Get full text
Thesis -
15
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…Secondly, a new DE algorithm (ARDE-SPX) is introduced that automatically adapts a repository of DE strategies and parameters control schemes to avoid the problems of stagnation and make DE respond to a wide range of function characteristics at different stages of evolutionary search. …”
Get full text
Get full text
Thesis -
16
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
17
Detection and Severity Identification of control valve stiction in industrial loops using integrated partially retrained CNN-PCA frameworks
Published 2021“…In this thesis, an integrated framework using such partially retrained convolutional neural networks in conjunction with principal component analysis (CNN-PCA) is proposed for simultaneous control valve stiction detection and automatic identification of the severity of the problem. …”
Get full text
Get full text
Thesis -
18
-
19
-
20
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item
