Search Results - (( evolution internet application algorithm ) OR ( java segmentation using algorithm ))
Search alternatives:
- application algorithm »
- internet application »
- java segmentation »
- using algorithm »
- evolution »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
3
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
DNA approach for password conversion generator
Published 2014Get full text
Get full text
Conference or Workshop Item -
5
Comparison between scheduling techniques in long term evolution
Published 2013Get full text
Get full text
Get full text
Article -
6
Differential evolution optimization for constrained routing in Wireless Mesh Networks
Published 2014“…However, this problem is NP-complete, hence, this paper proposes fast convergent Differential Evolution metaheuristic algorithm with bandwidth and delay constraints for minimum routing cost. …”
Get full text
Get full text
Get full text
Proceeding Paper -
7
-
8
Task scheduling in cloud computing using hybrid genetic algorithm and bald eagle search (GA-BES)
Published 2022“…Hence, Bald Eagle Search (BES) can increase efficiency and performance because it provides an efficient scheduling mechanism. The natural evolution optimization algorithm which is genetic algorithm can be improve by combining the nature meta-heuristic algorithms which is bald eagle search to improve the makespan of genetic algorithm using cloudsim that need to be implement on the eclipse platform. …”
Get full text
Get full text
Get full text
Academic Exercise -
9
Machine learning and deep learning approaches for cybersecurity: a review
Published 2022“…The rapid evolution and growth of the internet through the last decades led to more concern about cyber-attacks that are continuously increasing and changing. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
E-MyKad : An Online Identity Representation System for Malaysia’s Internet Community
Published 2013Get full text
Get full text
Final Year Project -
11
Performance analysis of EXP/PF and M-LWDF in downlink 3GPP LTE system
Published 2009Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Genetic Algorithm for Web Data Mining
Published 2001Get full text
Get full text
Project Paper Report -
13
Intersection Features For Android Botnet Classification
Published 2019“…The evolution of the Internet of things (IoT) has made a significant impact and availed opportunities for mobile device usage on human life. …”
Get full text
Get full text
Get full text
Article -
14
-
15
A secure trust aware ACO-Based WSN routing protocol for IoT
Published 2022“…The popularization of IoT-connected devices facilitating evolution of IoT applications does come with security challenges. …”
Get full text
Get full text
Get full text
Article -
16
Audio files comparator using wavelet transform and similarity metrics
Published 2025“…Despite these variations, the tunes or pitches of songs remain recognizable to the human ear and even audio detection algorithms. With the proliferation of digital music, people download songs from music applications or the internet, whether for personal listening in vehicles or to play in parties. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
IoT Soil Moisture Monitoring and Irrigation System Development
Published 2020“…Robotics or chemical technologies may not be the only improvements that could be exercised. Internet of Things (IoT) technology is one of an application widely used currently. …”
Get full text
Get full text
Get full text
Proceeding -
18
Fault tolerance structures in Wireless Sensor Networks (WSNs): survey, classification, and future directions
Published 2022“…Thus, the respective underlying Fault Tolerance (FT) structure is a critical requirement that needs to be considered when designing any algorithm in WSNs. Moreover, with the exponential evolution of IoT systems, substantial enhancements of current FT mechanisms will ensure that the system constantly provides high network reliability and integrity. …”
Get full text
Get full text
Article -
19
Evaluation of cloud 3D printing services oriented toward the product life cycle based on a triangular fuzzy number complementary judgment matrix
Published 2024“…In recent years, the realm of information technologies has undergone continual evolution, marked by significant progress in cloud computing, big data analytics, and the Internet of Things (IoT). …”
Get full text
Get full text
Get full text
Article -
20
Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain
Published 2017“…This evolution has gained the drawbacks in the advancement of forgery tools and application that enable perpetrators to steal, alter and destroy information during transmission. …”
Get full text
Get full text
Get full text
Thesis
