Search Results - (( development background coding algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- development background »
- coding algorithm »
- java application »
-
1
Detection of head position using chain code algorithm
Published 2007“…The image converted to binary image using Threshold Coding (TC) for difference between boundary and background. …”
Get full text
Get full text
Thesis -
2
Detection of head position using chain code algorithm
Published 2007“…The image converted to binary image using Threshold Coding (TC) for difference between boundary and background. …”
Get full text
Get full text
Thesis -
3
The evolution and trend of chain code scheme
Published 2008“…This paper explains some chain code concepts and their applications that are be the background of the development of vertex chain code cells algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Image clustering comparison of two color segmentation techniques
Published 2010“…The appropriate Java codes are developed for solve this task. The developed patterns are applied in the field of real-time analysis. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Static analysis of Android apps for lifecycle conformance
Published 2017“…This paper presents an automated approach based on static code analysis to aid novice developers in managing system resources during different stages of a mobile application’s lifecycle. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Development of images segmentation using image thresholder and batch processing technique on the blood smears
Published 2022“…A new segmentation technique with each pixel in the image has its own threshold is developed in response to the fact that standard threshold-based segmentation algorithms only establish one or many thresholds, making it difficult to extract the complex information in an image. …”
Get full text
Get full text
Get full text
Article -
7
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
8
Development of an intelligent multimodal biometric system for household appliances control
Published 2012“…To this effect, a novel skin segmentation algorithm using artificial neural network (ANN) technique was developed and this was deployed to segment the palmprint and face images from the background. …”
Get full text
Get full text
Get full text
Monograph -
9
Computerized simulation system for ECM radar system
Published 2007“…Next sequence diagrams were used to view the internal process within the simulation system. Finally before code generation, the flow chart of the simulation algorithm was used. …”
Get full text
Get full text
Get full text
Thesis -
10
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
POWER QUALITY CLASSIFICATION WITH DE-NOISING SCHEME USING WAVELET TRANSFORM AND RULE- BASED METHOD
Published 2012“…Unique features from the I", 4t h ,7th and 8thl evel details are obtained as criteria for developing a Rules-Based Algorithm for classifying disturbances that have occurred. …”
Get full text
Get full text
Thesis -
13
Comparative study of 3D reconstruction methods from 2D sequential images in sports
Published 2020“…These researches have been developed the algorithm that be able to solve illposed problem. …”
Get full text
Get full text
Get full text
Article
