Search Results - (( basic information technology algorithm ) OR ( java segmentation using algorithm ))
Search alternatives:
- technology algorithm »
- basic information »
- java segmentation »
- using algorithm »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
3
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Developing Bus Tracking System that predicts the arrival times of public buses at Universiti Teknologi PETRONAS (UTP) bus stops.
Published 2004“…Basically, the system works by locating and tracking any transportation using GPS technology installed in that transport. …”
Get full text
Get full text
Final Year Project -
5
Recent applications in quantitative methods and information technology
Published 2018“…This book is a guide for researchers who are involved in statistical, mathematical, information technology and decision science analyses. …”
Get full text
Get full text
Book -
6
Learning to filter text in forum message
Published 2005Get full text
Get full text
Conference or Workshop Item -
7
Butterfly traffic pattern in selection algorithm on hierarchical torus network
Published 2015Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Butterfly Triple System Algorithm Based on Graph Theory
Published 2022Get full text
Get full text
Get full text
Article -
9
Agent-based extraction algorithm for computational problem solving
Published 2015“…The results show that the extraction algorithm has been able to extract 100 % of the information correctly. …”
Get full text
Get full text
Thesis -
10
-
11
-
12
Direct approach for mining association rules from structured XML data
Published 2012“…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
Get full text
Get full text
Thesis -
13
-
14
-
15
Robust Image Watermarking Theories and Techniques: A Review
Published 2014“…The basic characteristics of digital watermark are imperceptibility, capacity, robustness and false positive of watermarking algorithm and security of the hiding place. …”
Get full text
Get full text
Get full text
Article -
16
-
17
Travelling Salesman Problem using Prim Algorithm in High Performance Computing
Published 2007Get full text
Get full text
Final Year Project -
18
-
19
-
20
Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming
Published 2019“…Block cipher algorithms become an essential domain in Information Technology (IT) due to ever increasing the number of attacks. …”
Get full text
Get full text
Get full text
Article
