Search Results - (( developing access control algorithm ) OR ( java segmentation using algorithm ))

Refine Results
  1. 1

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  2. 2

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…Finally, the algorithm found, which would solve the image segmentation problem.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Development of a Web Access Control Technique Based User Access Behavior by Abdelrahman, Selmaelsheikh

    Published 2004
    “…This thesis discusses about designs and develops techniques and algorithms for performing web access control. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    A federated usage control framework with ontology-based policy and elimination of irrelevant rules set algorithm for grid computing authorization by Maizura, Ibrahim

    Published 2019
    “…A high-level granularity access control model needs to be applied to achieve a fine-grained authorization. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    Experimental evaluation of bottleneck link utilization with new-additive increase multiplicative decrease congestion avoidance and control algorithm. by Jasem , Hayder Natiq, Ahmad Zulkarnain, Zuriati, Othman, Mohamed, Subramaniam, Shamala

    Published 2009
    “…And we can define the utilization as simply the throughput divided by the access rate. And also all the developments for the congestion control and avoidance algorithms interest about the using of network resources and use the links capacity (utilization). …”
    Get full text
    Get full text
    Article
  18. 18

    Face recognition door lock system / Danial Haziq Hakimi Salahuddin by Salahuddin, Danial Haziq Hakimi

    Published 2023
    “…The system provides a reliable and efficient method of access control while eliminating the need for traditional keys or access cards, making it convenient for users. …”
    Get full text
    Get full text
    Student Project
  19. 19

    Priority hybrid and EEF uplink scheduling algorithm for IEEE 802.16E by Oad, Aneel

    Published 2013
    “…In this research, two algorithms tailored at enhancing the performance of hybrid algorithms in the WiMAX domains have been designed and developed. …”
    Get full text
    Get full text
    Thesis
  20. 20