Search Results - (( java segmentation using algorithm ) OR ( based interval protocol algorithm ))
Search alternatives:
- protocol algorithm »
- java segmentation »
- interval protocol »
- using algorithm »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
3
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
QoS BASED ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORK
Published 2012“…To achieve QoS based energy efficient routing, three protocols are proposed, namely the QoS based Energy Efficient Clustering (QoSEC) for a WSN, the QoS based Energy Efficient Sleep/Wake Scheduling (QoSES) for a WSN, and the QoS based Energy Efficient Mobile Sink (QoSEM) based Routing for a Clustered WSN. …”
Get full text
Get full text
Thesis -
5
Adaptive manet OLSR routing protocol for optimal route selection in high dynamic network
Published 2020“…To provide the necessary robustness, a new Cluster-based Adoptive Cooperative Algorithm (CACA) for VANET is introduced to improve the scalability of the network and reduce control overhead. …”
Get full text
Get full text
Thesis -
6
A hybrid ANN for output power prediction and online monitoring in grid-connected photovoltaic system / Puteri Nor Ashikin Megat Yunus
Published 2023“…This thesis presents a new algorithm for output prediction and online monitoring in a Grid-Connected Photovoltaic (GCPV) system based on an artificial neural network. …”
Get full text
Get full text
Thesis -
7
Secure lightweight client for cloud-based E-Health Model
Published 2023“…Thirdly, an authorization algorithm named federated proxy implements for fine-grained access control based on CP-ABE (FPI-CP-ABE) is proposed. …”
Get full text
Get full text
Get full text
Thesis -
8
ANALYSIS OF PERFORMANCE PARAMETERS FOR WIRELESS NETWORK USING SWITCHING MULTIPLE ACCESS CONTROL METHOD
Published 2023“…Three control access is processed; polling, token passing, and reservation algorithms for collision avoidance. The reservation stage reserves the data before sending, which includes two timeline intervals; a fixed-time reservation period, and variable data transmission interval. …”
Article -
9
Authenticated collaborative key agreement for dynamic peer groups
Published 2009Get full text
Working Paper -
10
Impact of BPL penalty functions and PSF models in PET/CT radial spatial resolution recovery
Published 2024“…Advanced reconstruction algorithms like TOF, BPL, and PSF models, along with OSEM have shown spatial resolution enhancements based on the FWHM measured. …”
Get full text
Get full text
Monograph -
11
An intelligent optical fibre Al(lll) sensor based on advanced materials-sol-gel & polyaniline-porous nanocomposite / Faiz Bukhari Mohd Suah, Abdul Mutalib Md Jani and Mohd Nasir Ta...
Published 2006“…An orthogonal design is utilized to design the experimental protocol, in which three variables are varied simultaneously. …”
Get full text
Get full text
Research Reports -
12
Quality Of Service Provisioning Scheme For Real-Time Applications in IEEE 802.11 Wireless Local Area Network
Published 2006“…The emerging 802.1 1e standard is tackling the exploding volume of traffic in WLANs with a long -term solution based on QoS-architectures. QoS delivers predictability and consistency into existing variability of best-effort delivery system offered in internet protocol (IP) and IEEE 802.11 wireless networks. …”
Get full text
Get full text
Thesis -
13
Distributed joint power control, beamforming and spectrum leasing for cognitive two-way relay networks
Published 2017“…Once the number of iterations conditioning along each dimension corresponds with the length of price interval, the convergence of algorithm is achieved. …”
Get full text
Get full text
Thesis -
14
Traffic Control in a Synchronous Transfer Mode Networks
Published 1995“…Similarly, charges may differ for customers wanting to book capacity for a specified tie interval. Based on this scenario, various charge classes and booking policies are introduced. …”
Get full text
Get full text
Thesis
