Search Results - (( developing access control algorithm ) OR ( java segmentation using algorithm ))
Search alternatives:
- developing access »
- java segmentation »
- using algorithm »
-
1
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
2
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Development of a Web Access Control Technique Based User Access Behavior
Published 2004“…This thesis discusses about designs and develops techniques and algorithms for performing web access control. …”
Get full text
Get full text
Thesis -
5
-
6
A Quantum Lightning Search Algorithm-Based Fuzzy Speed Controller for Induction Motor Drive
Published 2023Article -
7
-
8
-
9
-
10
-
11
-
12
A federated usage control framework with ontology-based policy and elimination of irrelevant rules set algorithm for grid computing authorization
Published 2019“…A high-level granularity access control model needs to be applied to achieve a fine-grained authorization. …”
Get full text
Get full text
Thesis -
13
An optimal LFC in two-area power systems using a meta-heuristic optimization algorithm
Published 2023Article -
14
-
15
-
16
-
17
Experimental evaluation of bottleneck link utilization with new-additive increase multiplicative decrease congestion avoidance and control algorithm.
Published 2009“…And we can define the utilization as simply the throughput divided by the access rate. And also all the developments for the congestion control and avoidance algorithms interest about the using of network resources and use the links capacity (utilization). …”
Get full text
Get full text
Article -
18
Face recognition door lock system / Danial Haziq Hakimi Salahuddin
Published 2023“…The system provides a reliable and efficient method of access control while eliminating the need for traditional keys or access cards, making it convenient for users. …”
Get full text
Get full text
Student Project -
19
Priority hybrid and EEF uplink scheduling algorithm for IEEE 802.16E
Published 2013“…In this research, two algorithms tailored at enhancing the performance of hybrid algorithms in the WiMAX domains have been designed and developed. …”
Get full text
Get full text
Thesis -
20
