Search Results - (( basic scheme based algorithm ) OR ( java segmentation using algorithm ))
Search alternatives:
- java segmentation »
- using algorithm »
- scheme based »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Dynamic Feedback Flow Control Algorithms for Unicast and Multicast Available Bit Rate Service in Asynchronous Transfer Mode Networks
Published 2000“…A dynamic rate-based flow control (DRFC) scheme has been developed to support ABR service in unicast environment, while an adaptive feedback consolidation (AFC) algorithm has been designed for ABR multicasting. …”
Get full text
Get full text
Thesis -
3
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
4
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…One such lightweight scheme is the AA-Beta (AAḃ) asymmetric cryptographic scheme whose algorithm consists of only basic arithmetic operations of addition and subtraction for both the encryption and decryption processes. …”
Get full text
Get full text
Thesis -
6
A new modern scheme for solving fractal–fractional differential equations based on deep feedforward neural network with multiple hidden layer
Published 2024“…During the initial stage of the method development, the basic framework on solving FFDEs is designed. To minimize the burden of computational time, the vectorized algorithm is constructed at the next stage for method to be performed efficiently. …”
Get full text
Get full text
Article -
7
A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations
Published 2011“…However, most of the existing public-key algorithms are based on complex mathematical computations. …”
Get full text
Get full text
Thesis -
8
-
9
Development an accurate and stable range-free localization scheme for anisotropic wireless sensor networks
Published 2022“…Accordingly, this study aspires to bridge the research gap by exploring a new DV-Hop algorithm to build a fast, costefficient, strong range-free localization scheme. …”
Get full text
Get full text
Thesis -
10
Cluster-based spectrum sensing scheme in heterogeneous network
Published 2014“…The proposed SS scheme adopted the basic model of energy detec-tor and compared with cooperative spectrum sensing scheme. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
Cluster-based spectrum sensing scheme in heterogeneous network
Published 2015“…The proposed SS scheme adopted the basic model of energy detector and compared with cooperative spectrum sensing scheme. …”
Get full text
Get full text
Get full text
Get full text
Book Chapter -
12
Image watermarking optimization algorithms in transform domains and feature regions
Published 2012“…As a result,it will first introduce the theories about the feature extraction and the basic principles on how feature points can act as locating resynchronization between watermark insertion and extraction discussed in detail.Subsequently,it will present several content-based watermark embedding and extraction methods which can be directly implemented based on the synchronization scheme.Further detailed watermarking schemes which combine feature regions extraction with counter propagation neural network-based watermarks synapses memorization are then presented.The performance of watermarking schemes based on framework of feature point shows the following advantages:a)Good imperceptibility. …”
Get full text
Get full text
Thesis -
13
Volterra algorithm for modelling sea surface current circulation from satellite altimetry data
Published 2008Get full text
Get full text
Book Section -
14
Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks
Published 2015“…IEEE 802.16e uses multicast and broadcast service (MBS) as an efficient mechanism to distribute the same data concurrently to multiple mobile stations (MSs) through one Base Station. To generate, update and distribute the keys for secure communication over IEEE 802.16e, the MBS applies Multicast and Broadcast Rekeying Algorithm (MBRA) as a basic key management algorithm. …”
Get full text
Get full text
Thesis -
15
-
16
One-dimension high-order compact method for solving euler's equation
Published 2010“…Among those most famous and relevant are based on flux vector splitting and Godunov-type schemes. …”
Get full text
Get full text
Thesis -
17
Scheduling scientific workflow using multiobjective algorithm with fuzzy resource utilization in multi-cloud environment
Published 2020“…Simulation experiments reveal that FR-MOS outperforms the basic MOS over the PSO algorithm.…”
Get full text
Get full text
Article -
18
One-dimensional high-order compact method for solving Euler's equations
Published 2011“…Among those most famous and relevant are based on flux vector splitting and Godunov-type schemes. …”
Get full text
Get full text
Conference or Workshop Item -
19
Development of Automatic Load-Shedding Strategy for Stand-Alone Photovoltaic System
Published 2014“…Output of this project can support the DC loads and load-shedding strategy scheme is performed based on the designed algorithm.…”
Get full text
Get full text
Article -
20
Quality Of Service Provisioning Scheme For Real-Time Applications in IEEE 802.11 Wireless Local Area Network
Published 2006“…The SNT adapts contention parameters of individual ACs based on the network load in a basic service set (BSS). …”
Get full text
Get full text
Thesis
