Search Results - (( evolution internet application algorithm ) OR ( java segmentation using algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…Finally, the algorithm found, which would solve the image segmentation problem.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  3. 3
  4. 4
  5. 5
  6. 6

    Differential evolution optimization for constrained routing in Wireless Mesh Networks by Sanni, Mistura Laide, Hassan Abdalla Hashim, Aisha, Hassan, Wan Haslina, Ahmed, Gharib Subhi Mahmoud, Anwar, Farhat, Zakaria, Omar

    Published 2014
    “…However, this problem is NP-complete, hence, this paper proposes fast convergent Differential Evolution metaheuristic algorithm with bandwidth and delay constraints for minimum routing cost. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7
  8. 8

    Task scheduling in cloud computing using hybrid genetic algorithm and bald eagle search (GA-BES) by Kamal Khairi Supaprhman

    Published 2022
    “…Hence, Bald Eagle Search (BES) can increase efficiency and performance because it provides an efficient scheduling mechanism. The natural evolution optimization algorithm which is genetic algorithm can be improve by combining the nature meta-heuristic algorithms which is bald eagle search to improve the makespan of genetic algorithm using cloudsim that need to be implement on the eclipse platform. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  9. 9

    Machine learning and deep learning approaches for cybersecurity: a review by Halbouni, Asmaa Hani, Gunawan, Teddy Surya, Habaebi, Mohamed Hadi, Halbouni, Murad, Kartiwi, Mira, Ahmad, Robiah

    Published 2022
    “…The rapid evolution and growth of the internet through the last decades led to more concern about cyber-attacks that are continuously increasing and changing. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12
  13. 13

    Intersection Features For Android Botnet Classification by Ismail, Najiahtul Syafiqah, Yusof, Robiah, Saad, Halizah, Abdollah, Mohd Faizal, Yusof, Robiah

    Published 2019
    “…The evolution of the Internet of things (IoT) has made a significant impact and availed opportunities for mobile device usage on human life. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    A secure trust aware ACO-Based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2022
    “…The popularization of IoT-connected devices facilitating evolution of IoT applications does come with security challenges. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Audio files comparator using wavelet transform and similarity metrics by Lee, Da Long

    Published 2025
    “…Despite these variations, the tunes or pitches of songs remain recognizable to the human ear and even audio detection algorithms. With the proliferation of digital music, people download songs from music applications or the internet, whether for personal listening in vehicles or to play in parties. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    IoT Soil Moisture Monitoring and Irrigation System Development by Chew, Kim Mey, Syvester Tan, Chiang Wei, Gary Loh, Chee Wyai, Nancy, Bundan, Yiiong, Siew Ping

    Published 2020
    “…Robotics or chemical technologies may not be the only improvements that could be exercised. Internet of Things (IoT) technology is one of an application widely used currently. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  18. 18

    Fault tolerance structures in Wireless Sensor Networks (WSNs): survey, classification, and future directions by Adday, Ghaihab Hassan, K. Subramaniam, Shamala, Ahmad Zukarnain, Zuriati, Samian, Normalia

    Published 2022
    “…Thus, the respective underlying Fault Tolerance (FT) structure is a critical requirement that needs to be considered when designing any algorithm in WSNs. Moreover, with the exponential evolution of IoT systems, substantial enhancements of current FT mechanisms will ensure that the system constantly provides high network reliability and integrity. …”
    Get full text
    Get full text
    Article
  19. 19

    Evaluation of cloud 3D printing services oriented toward the product life cycle based on a triangular fuzzy number complementary judgment matrix by Zhang, Chenglei, Li, Xiaoqian, Liu, Jiajia, Zhang, Yuanming, Zainudin, Edi Syams, Xu, Bo, Zhou, Sheng Fei, As’arry, Azizan Bin, Ismai, Mohd Idris Shah

    Published 2024
    “…In recent years, the realm of information technologies has undergone continual evolution, marked by significant progress in cloud computing, big data analytics, and the Internet of Things (IoT). …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain by Mehdi , Hussain

    Published 2017
    “…This evolution has gained the drawbacks in the advancement of forgery tools and application that enable perpetrators to steal, alter and destroy information during transmission. …”
    Get full text
    Get full text
    Get full text
    Thesis