Search Results - (( intelligent segmentation using algorithm ) OR ( java implementation using algorithm ))

Refine Results
  1. 1

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  2. 2

    Non-invasive gliomas grading using swarm intelligence algorithm / Muhammad Harith Ramli by Ramli, Muhammad Harith

    Published 2017
    “…The basic feature extraction of minimum, maximum and mean of gray level values are used as the parameter to develop the prototype. Swarm intelligence (SI) algorithm is implemented because there are lot of previous works which prove that the SI is good for segmentation and classification. …”
    Get full text
    Get full text
    Thesis
  3. 3

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  5. 5

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Mr image volume segmentation using neuro-fuzzy method / Ahmad Safwan Mohamed Makki by Ahmad Safwan, Mohamed Makki

    Published 2003
    “…This overcomes the shortcoming of both and can provide a robust and intelligent methodology for image analysis. This documentation is about the implementation of neuro-fuzzy approach using Fuzzy Hopfield Neural Network (FHNN) algorithm for the segmentation process of MR image data sets.…”
    Get full text
    Get full text
    Thesis
  12. 12

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Optic cup and optic disc segmentation using improved selfish gene algorithm / Norharyati Md Ariff by Md Ariff, Norharyati

    Published 2016
    “…This study performed using a new bio-inspired algorithm; Selfish Gene Algorithm (SFGA) for optic cup and optic disc segmentation. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Cuckoo search algorithm and wind driven optimization based study of satellite image segmentation for multilevel thresholding using Kapur’s entropy by Bhandari, A.K., Singh, V.K, Kumar, A., Singh, G.K.

    Published 2014
    “…To overcome this problem, two successful swarm-intelligence-based global optimization algorithms, cuckoo search (CS) algorithm and wind driven optimization (WDO) for multilevel thresholding using Kapur’s entropy has been employed. …”
    Get full text
    Get full text
    Article
  15. 15

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Behavior Recognition In Video Surveillance System For Indoor Public Areas Using Artificial Immune System by Abad, Azad

    Published 2008
    “…Behavior recognition and predicting the activities of people in public areas are still a major concern in image processing and artificial intelligence science. Artificial intelligence systems are widely used to extract and analyze the complicated human actions through logical and mathematical rules. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20