Search Results - (( basic date detection algorithm ) OR ( java segmentation using algorithm ))

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…Finally, the algorithm found, which would solve the image segmentation problem.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  3. 3
  4. 4

    A comparative analysis of image copy-move forgery detection algorithms based on hand and machine-crafted features by Ahmed I.T., Hammad B.T., Jamil N.

    Published 2023
    “…IC-MFDs based hand-crafted features and IC-MFDs based machine-crafted features. IC-MFD algorithms based hand-crafted features are the algorithms that detect the faked image depending on manual feature extraction while IC-MFD algorithms based machine-crafted features are the algorithms that detect the faked image automatically from image. …”
    Article
  5. 5

    Autonomous Fire Fighting Mobile Platform by Teh, Nam Khoon, Saman, Abu Bakar Sayuti, Sebastian , Patrick

    Published 2012
    “…Development work done to date on the platform has shown its feasibility of being an autonomous unit to monitor a prescribed area, detect for fire and extinguish the flame.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Design and development of iRemote Terminal Unit (iRTU) for undervoltage and overvoltage fault by Wan Nor Shela Ezwane, Wan Jusoh

    Published 2014
    “…Power outages is always happened and its take a longer time for fault detection, isolation and restoration. Existing RTU is very expensive because it needs to be imported. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…As many up-to-date data are used during the learning, the detection system would become more robust to the latest strategy of the cybercriminal. …”
    Get full text
    Get full text
    Thesis
  8. 8