Search Results - (( developing sigma implementation algorithm ) OR ( java segmentation using algorithm ))
Search alternatives:
- implementation algorithm »
- sigma implementation »
- java segmentation »
- developing sigma »
- using algorithm »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
3
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Under voltage load shedding scheme using meta-heuristic optimization methods [Meta-heurystyczne metody optymalizacyjne wykorzystywane do szybkiego pozbywania si? obci??enia sieci]
Published 2023“…This study provides an overview of all the meta-heuristic methods implemented for under voltage load shedding in power systems. © 2014, Wydawnictwo SIGMA - N O T Sp. z o.o. …”
Article -
5
A New Optimization Technique Of Support Vector Machine For Electricity Market Price Forecasting
Published 2019“…Therefore, a hybrid of Least Square Support Vector Machine (LSSVM) and Bacterial Foraging Optimization Algorithms (BFOA) is proposed in this research to provide an accurate price forecast with optimized LSSVM parameters (gamma and sigma) and features. …”
Get full text
Get full text
Get full text
Technical Report -
6
Zero distortion-based steganography for handwritten signature
Published 2018“…This means that any changes on the cover media (c) could lead to the identification of the stego media (s), which contains the secret message (m). Thus, developing a steganographic algorithm to use cover media (c) without raising attention is the most challenging task in data hiding. …”
Get full text
Get full text
Get full text
Thesis
