Search Results - (( basic digitalization _ algorithm ) OR ( java segmentation using algorithm ))

Refine Results
  1. 1

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…Finally, the algorithm found, which would solve the image segmentation problem.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  3. 3
  4. 4

    Segmentation of Malay syllables in connected digit speech using statistical approach by Salam, M.S., Mohamad, Dzulkifli, Saleh, S.H.

    Published 2008
    “…This study present segmentation of syllables in Malay connected digit speech. Segmentation was done in time domain signal using statistical approaches namely the Brandt’s Generalized Likelihood Ratio (GLR) algorithm and Divergence algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    Properties of digital image watermarking by Abdullatif, Mohammad, Zeki, Akram M., Chebil, Jalel, Gunawan, Teddy Surya

    Published 2013
    “…This paper highlights digital image watermarking. It starts with a basic model of digital image watermarking, it discusses the main requirements and applications. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    Robust Image Watermarking Theories and Techniques: A Review by Jasni, Mohamad Zain, Tao, Hai, Chongmin, Li, Abdalla, Ahmed N.

    Published 2014
    “…The basic characteristics of digital watermark are imperceptibility, capacity, robustness and false positive of watermarking algorithm and security of the hiding place. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Hevea leaf features extraction and recognition algorithm for hevea clones classification using image / Mohamad Faizal Ab Jabal, Suhardi Hamid, Salehuddin Shuib by Ab Jabal, Mohamad Faizal, Hamid, Suhardi, Shuib, Salehuddin

    Published 2013
    “…The basic leaf features considered by the algorithm had been defined by Wu et al. [1] involved diameter of the leaf, physiological length, physiological width, leaf area and leaf perimeter. …”
    Get full text
    Get full text
    Research Reports
  10. 10

    Data depublication using : Hashing algorithm / Naimah Nayan by Nayan, Naimah

    Published 2019
    “…With the rapid growth of digital data that generated in the digital world, the capacity of storage usage will increase rapidly. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Bridging Mayer’s cognitive theory of multimedia learning and computational thinking in tackling the cognitive load issues among young digital natives : a conceptual framework by Wan Nor Ashiqin Wan Ali, Wan Ahmad Jaafar Wan Yahaya

    Published 2022
    “…It is undeniable that a digital native must begin with at least a basic level of computer knowledge in order to manage their education and daily life. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Recognition of isolated elements picture using backpropagation neural network / Melati Sabtu by Sabtu, Melati

    Published 2005
    “…The project used Back-propagation Neural Network for the algorithm to classified images. Images that capture using digital camera will perform through the algorithm to classified images. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Developing a secure mechanism for Bluetooth-based Wireless Personal Area Networks (WPANs) by Othman, Marini, Hassan, Wan Haslina, Hassan Abdalla Hashim, Aisha

    Published 2007
    “…This is necessary since the present Bluetooth security has certain drawbacks in its implementation making it insecure. The use of digital signatures and trusted or certified public keys form the basic premise and approach in this work in providing stronger security for WPANs. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE by FLORISCA, ALDINA GODULUS

    Published 2019
    “…Further, the hash function uses a mathematics conversion to inevitable “encrypt” messages to provide a digital fingerprint. Basically it is used for message digest. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  18. 18

    Deterministic Automatic Test Pattern Generation for Built-In Self Test System by Mohammed Khalid, Muhammad Nazir

    Published 2006
    “…To illustrate that, the DATPG algorithm for digital combinational circuit using VHDL language is designed to generate the test patterns. …”
    Get full text
    Get full text
    Thesis
  19. 19

    JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation by Abu, Ahmad Zaidee

    Published 2008
    “…This thesis work studied on digital image encryption algorithms performed towards JPEG images. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This will involve the explanation of the use of evolution algorithms combined with the music programming to be able to create creative digital music.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis