Search Results - (( flood detection method algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- method algorithm »
- java application »
- flood detection »
-
1
Cars detection in stitched image using morphological approach
Published 2017“…The performance of the proposed cars detection algorithm could detect the cars fairly accurate. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
2
Quranic diacritic and character segmentation and recognition using flood fill and k-nearest neighbors algorithm
Published 2019“…The diacritic detections are performed using a region-based algorithm with 89% accuracy and 95% improved by using flood fill segmentations method. 2DMED feature extraction accuracy was 90% for diacritics and 96% improved by applied CNN. …”
Get full text
Get full text
Thesis -
3
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
4
Image processing-based flood detection
Published 2019“…The steps are as follows: (1) Region of Interest to create a portion of an image to filter or perform some other operation. (2) Brightness and contrast adjustment in order to get brighter and better image before the next process. (3) Grayscale and threshold to create segmentation object with Otsu-thresholding. ( 4) Edge detection algorithm to find edge points on a roughly horizontal water line and riverbank height By using the above method, the system can read and monitor the \Valer level of a river or other water bodies. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
River segmentation with Atrous Convolution via DeepLabv3 / Nur Adilah Hamid
Published 2020“…Flood has been identified as a common issue for years. …”
Get full text
Get full text
Student Project -
6
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
7
Development of river water level estimation from surveillance cameras for flood monitoring system using deep learning techniques
Published 2022“…The findings demonstrated that these methods are handcrafted and the algorithms need to be changed when applying to different images, which is not practical to be used during flood disasters. …”
Get full text
Get full text
Thesis -
8
Disaster monitoring in urban and remote areas using satellite stereo images: A depth estimation approach
Published 2015“…In our paper, we have proposed a method to monitor the disaster using satellite stereo images which can detect and measure the intensity of damage. …”
Get full text
Get full text
Conference or Workshop Item -
9
Disaster monitoring in urban and remote areas using satellite stereo images: A depth estimation approach
Published 2015“…In our paper, we have proposed a method to monitor the disaster using satellite stereo images which can detect and measure the intensity of damage. …”
Get full text
Get full text
Conference or Workshop Item -
10
Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol
Published 2018“…However, these IDS methods only detect specific attack but fails when the attacks are combined. …”
Get full text
Get full text
Article -
11
-
12
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
13
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
14
-
15
-
16
Composite Drilling Monitoring System
Published 2019“…Then, the images taken undergo image pre-processing and further analyse to detect wear by image fusion method. During the image pre-processing, the true colour image is converted into binary images and canny edge detector is applied to detect the flank boundary. …”
Get full text
Get full text
Monograph -
17
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
18
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
19
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
20
