Search Results - (( basic communication components algorithm ) OR ( java segmentation using algorithm ))

  • Showing 1 - 12 results of 12
Refine Results
  1. 1

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…Finally, the algorithm found, which would solve the image segmentation problem.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  3. 3
  4. 4
  5. 5
  6. 6

    Improving PID controller of motor shaft angular position by using genetic algorithm by Muhamad, Arif Abidin

    Published 2015
    “…This problem among other is affected by existing the nonlinearities component in the system, the system communication noise, and not optimize PID parameter. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Solar power inverter by Mohd Hafizuddin, Mohamed Ariffin

    Published 2013
    “…The solar power inverter is the one of the critical component in a solar system that has been developed. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  9. 9

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  10. 10

    Simulation of quantum growing network / Ong Boon Teong by Ong , Boon Teong

    Published 2003
    “…If current trends continue, by the year 2020 the basic memory components of a computer will be the size of individual atoms. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Development and integration of capacitive sensing and electrocuting grid for mosquitoes surveillance and control by Khoo, Brendan Teng Thiam

    Published 2020
    “…The final proposed system is tested with a basic species recognition algorithm and achieved species recognition rate of between 75% to 83% and selective trapping rate of between 63% to 69%.…”
    Get full text
    Get full text
    Get full text
    Thesis