Search Results - (( java implementation level algorithm ) OR ( problem segmentation models algorithm ))
Search alternatives:
- implementation level »
- problem segmentation »
- java implementation »
- segmentation models »
- models algorithm »
- level algorithm »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Fuzzy modeling of brain tissues in Bayesian segmentation of brain MR images
Published 2010Get full text
Get full text
Conference or Workshop Item -
3
An enhanced segment particle swarm optimization algorithm for kinetic parameters estimation of the main metabolic model of Escherichia coli
Published 2020“…Hence, based on the aforementioned problems, the optimization algorithm methods played an important role in addressing these problems. …”
Get full text
Get full text
Get full text
Article -
4
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
5
Latent fingerprint enhancement and segmentation technique based on hybrid edge adaptive DTV model
Published 2021“…Image enhancement and segmentation is widely used for fingerprint identification and authorization in biometrics devices, criminal scene is most challenges due to low quality of fingerprint , the most significant efforts is to develop algorithm for latent fingerprint enhancement which become challenging problem due to the complex and existing problem for instance, developing algorithms of latent fingerprint is able to extract features of image blocks and removing overlapping and isolate the poor and noisy background. however, it's still challenging and interested problem specifically latent fingerprint enhancement and segmentation . …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Model-based hybrid variational level set method applied to lung cancer detection
Published 2024“…This enhanced algorithm proves advantageous for addressing real-world image segmentation problems and nodules detection challenges.…”
Get full text
Get full text
Get full text
Article -
7
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
8
-
9
COMPUTERIZED SEGMENTATION OF SINUS IMAGES
Published 2009“…This work attempts to solve this problem by developing an algorithm for the computerized segmentation of sinus images for the detection and grading of' sinusitis. …”
Get full text
Get full text
Final Year Project -
10
Human face detection using skin color segmentation and watershed algorithm
Published 2017“…Moreover, a new framework for efficient face detection using skin color segmentation is proposed. The process involves transforming the face images from RGB to the selected color models; then segmentation is carried out by selecting a threshold value for each of the color models. …”
Get full text
Get full text
Article -
11
-
12
Automated Deform Detection On Automotive Body Panels Using Gradient Filtering And Fuzzy C-Mean Segmentation
Published 2016“…An algorithm to segment the deform area has been developed. …”
Get full text
Get full text
Article -
13
A rule-based image segmentation method and neural network model for classifying fruit in natural environment / Hamirul'aini Hambali
Published 2015“…Therefore, another segmentation method has been developed to address the problem. …”
Get full text
Get full text
Thesis -
14
Integrated reconstruction of 2D overlapping coronary artery from x-ray angiography with 3D virtual myocardial model using non-rigid iterative closest point algorithm
Published 2019“…It also enhances the performance of coronary artery segmentation methods in angiography by solving the problem of overlapping vessels. …”
Get full text
Get full text
Thesis -
15
Using Bimodal Gaussian Mixture Model-Based Algorithm for Background Segmentation in Thermal Fever Mass Screening
Published 2011“…In this paper, an algorithm based on Gaussian Bi -modal Mixture Models (GBMM) is proposed for background-foreground segmentation as an important feature to identify medial canthal area. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
A feature-based approach for segmenting faces
Published 2004“…In this paper, we propose a feature-based algorithm for segmenting faces that is sufficiently generic and is also easily extensible to cope with more demanding variations of the imaging conditions. …”
Get full text
Get full text
Article -
17
Automated visual defect detection using deep learning
Published 2022“…Model analysis and evaluation are performed to compare the performance of all the algorithms in a variety of aspects. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
19
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
20
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article
