Search Results - (( development process application algorithm ) OR ( java segmentation using algorithm ))
Search alternatives:
- application algorithm »
- process application »
- java segmentation »
- using algorithm »
-
1
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
2
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022“…To facilitate industrial automation, the previous process's displayed information must be recognized as the input to the subsequent process, even more so when direct communication between processes is not visible. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Image Processing Of Digital Mammograms For Breast Cancer Detection And Classification
Published 2018“…The algorithms to be developed will consist of pre-processing, enhancement and image segmentation. …”
Get full text
Get full text
Monograph -
5
-
6
Development of Simulated Annealing Based Scheduling Algorithm for Two Machines Flow Shop Problem
Published 2015Get full text
Get full text
Get full text
Conference or Workshop Item -
7
A filtering algorithm for efficient retrieving of DNA sequence
Published 2009“…An automaton-based algorithm is used to develop the filtering process proposed. …”
Get full text
Get full text
Get full text
Article -
8
Development of New Genetic Algorithm Software for Blow Mould Process
Published 2008Get full text
Get full text
Conference or Workshop Item -
9
loformation Retrieval - using Porter Stemming Algorithm
Published 2006“…The scope of the project is to implement the original Porter Stemming Algorithm in the application to improved the precision and recall in the retrieving document process. …”
Get full text
Get full text
Final Year Project -
10
Development of symbolic algorithms for certain algebraic processes
Published 2007Get full text
Get full text
Get full text
Monograph -
11
Development of symbolic algorithms for certain algebraic processes
Published 2007Get full text
Get full text
Get full text
Monograph -
12
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
13
Extracting feature from images by using K-Means clustering algorithm / Abdul Hakim Zainal Abidin
Published 2016“…Methodology of this research consists of Planning and Analysis, Data Collection, Algorithm Design and Development and Testing. All the process in developing the prototype will be reveal later in this report. …”
Get full text
Get full text
Thesis -
14
-
15
E4ML: Educational Tool for Machine Learning
Published 2003Get full text
Get full text
Conference or Workshop Item -
16
Development of Digital Image Processing Algorithms via FPGA Implementation
Published 2024“…The rapid development of digital image processing techniques has enabled various applications in fields such as healthcare, transportation, and manufacturing. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
-
18
-
19
Implication of image processing algorithm in remote sensing and GIS applications
Published 2011“…This review emphasizes the effects and consumption of different algorithms in different image processing applications. …”
Get full text
Get full text
Get full text
Article -
20
Encrypted email using 3D AES block cipher algorithm / Khairah Mohd Wi
Published 2015“…Encrypted email is addition mail that comes up with prototype application called,3D-AES block cipher. There are three objective designed: To identify an encrypted email application development of 3D AES block cipher algorithm and hash process, to develop encrypted email using 3D AES process on email and lastly to measure the validity of the encrypted & decrypted email message by comparing the hash value generate before encrypt and after decrypt. …”
Get full text
Get full text
Thesis
