Search Results - (( basic digitalization _ algorithm ) OR ( java segmentation using algorithm ))
Search alternatives:
- basic digitalization »
- java segmentation »
- using algorithm »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
3
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Segmentation of Malay syllables in connected digit speech using statistical approach
Published 2008“…This study present segmentation of syllables in Malay connected digit speech. Segmentation was done in time domain signal using statistical approaches namely the Brandt’s Generalized Likelihood Ratio (GLR) algorithm and Divergence algorithm. …”
Get full text
Get full text
Get full text
Article -
5
-
6
-
7
Properties of digital image watermarking
Published 2013“…This paper highlights digital image watermarking. It starts with a basic model of digital image watermarking, it discusses the main requirements and applications. …”
Get full text
Get full text
Get full text
Proceeding Paper -
8
Robust Image Watermarking Theories and Techniques: A Review
Published 2014“…The basic characteristics of digital watermark are imperceptibility, capacity, robustness and false positive of watermarking algorithm and security of the hiding place. …”
Get full text
Get full text
Get full text
Article -
9
Hevea leaf features extraction and recognition algorithm for hevea clones classification using image / Mohamad Faizal Ab Jabal, Suhardi Hamid, Salehuddin Shuib
Published 2013“…The basic leaf features considered by the algorithm had been defined by Wu et al. [1] involved diameter of the leaf, physiological length, physiological width, leaf area and leaf perimeter. …”
Get full text
Get full text
Research Reports -
10
Data depublication using : Hashing algorithm / Naimah Nayan
Published 2019“…With the rapid growth of digital data that generated in the digital world, the capacity of storage usage will increase rapidly. …”
Get full text
Get full text
Thesis -
11
Development of a new nonlinear filtering algorithm for impulse noise reduction
Published 2020Get full text
Get full text
Research Report -
12
Bridging Mayer’s cognitive theory of multimedia learning and computational thinking in tackling the cognitive load issues among young digital natives : a conceptual framework
Published 2022“…It is undeniable that a digital native must begin with at least a basic level of computer knowledge in order to manage their education and daily life. …”
Get full text
Get full text
Get full text
Article -
13
Recognition of isolated elements picture using backpropagation neural network / Melati Sabtu
Published 2005“…The project used Back-propagation Neural Network for the algorithm to classified images. Images that capture using digital camera will perform through the algorithm to classified images. …”
Get full text
Get full text
Thesis -
14
-
15
Active contour model on digital mammograms using low-cost parallel computing systems
Published 2009Get full text
Book Section -
16
Developing a secure mechanism for Bluetooth-based Wireless Personal Area Networks (WPANs)
Published 2007“…This is necessary since the present Bluetooth security has certain drawbacks in its implementation making it insecure. The use of digital signatures and trusted or certified public keys form the basic premise and approach in this work in providing stronger security for WPANs. …”
Get full text
Get full text
Get full text
Proceeding Paper -
17
DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE
Published 2019“…Further, the hash function uses a mathematics conversion to inevitable “encrypt” messages to provide a digital fingerprint. Basically it is used for message digest. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
18
Deterministic Automatic Test Pattern Generation for Built-In Self Test System
Published 2006“…To illustrate that, the DATPG algorithm for digital combinational circuit using VHDL language is designed to generate the test patterns. …”
Get full text
Get full text
Thesis -
19
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
Published 2008“…This thesis work studied on digital image encryption algorithms performed towards JPEG images. …”
Get full text
Get full text
Thesis -
20
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This will involve the explanation of the use of evolution algorithms combined with the music programming to be able to create creative digital music.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
