Search Results - (( java segmentation using algorithm ) OR ( basic integrated network algorithm ))
Search alternatives:
- integrated network »
- java segmentation »
- basic integrated »
- using algorithm »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Power Delivery Network Modeling And Simulation By Using Delaunay-Voronoi Triangulation And The Latency Insertion Method
Published 2018“…However, typical LIM algorithm is facing problem on its stability. Therefore, in the project, modeled power planes are simulated with basic LIM and voltage-in-current formulated LIM. …”
Get full text
Get full text
Monograph -
3
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
4
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
An Integrated Approach to the Reduction of Reactive Power Losses in Radial Distribution Network
Published 2004“…The scope of study would be on the capacitor insertion in radial distribution network. An existing algorithm will be studied and an integrated approach to the reduction ofreactive power losses will be proposed. …”
Get full text
Get full text
Final Year Project -
6
Dynamic Feedback Flow Control Algorithms for Unicast and Multicast Available Bit Rate Service in Asynchronous Transfer Mode Networks
Published 2000“…Asynchronous transfer mode (ATM) network technology has been adopted to integrate different kinds of traffic, like video, audio and data. …”
Get full text
Get full text
Thesis -
7
Developing a secure mechanism for Bluetooth-based Wireless Personal Area Networks (WPANs)
Published 2007“…This paper highlights our work in developing an enhanced security framework for Bluetooth-based wireless personal area networks (WPANs). The basic security architecture of Bluetooth, operating at the link layer, is augmented with a higher application layer security mechanism for authentication and message integrity. …”
Get full text
Get full text
Get full text
Proceeding Paper -
8
Optimization of supply chain management by simulation based RFID with XBEE Network
Published 2015“…Thus, its communication range was enhanced by the integration of RFID with XBee (ZigBee) wireless mesh network devices. …”
Get full text
Get full text
Get full text
Thesis -
9
A novel spiral backoff mechanism for wireless sensor networks MAC protocol in smart grid system
Published 2015“…The IEEE 802.15.4 standard provides a basic foundation by defining the physical and MAC layer of the low power wireless sensor network. …”
Get full text
Get full text
Get full text
Proceeding Paper -
10
Development an accurate and stable range-free localization scheme for anisotropic wireless sensor networks
Published 2022“…This study developed an optimized variation of the DV-Hop localization algorithm for anisotropic wireless sensor networks. …”
Get full text
Get full text
Thesis -
11
Implementation of UPFC model into fast decoupled load flow
Published 2004“…By using this approach, the basic Fast decoupled algorithm can be added with functionality to analyze UPFC without the need to modify the whole algorithm, which will require minimum modification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Heuristic resource allocation algorithm for controller placement in multi-control 5G based on SDN/NFV architecture
Published 2021“…The integration of Software Defined Networking (SDN) and Network Function Virtualization (NFV) is considered to be an efficient solution that enables the forecasting of highly scalable, optimal performance of 5G networks by providing an effective means of network functionality. …”
Get full text
Get full text
Get full text
Article -
13
-
14
A review of navigation systems (integration and algorithms)
Published 2009Get full text
Get full text
Get full text
Article -
15
Designing an integrated AIOT system for tracking class attendance
Published 2024“…Further enhancements including integrating of night vision cameras and research on face recognition algorithms that utilizes GPU can improve the system performance. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
A hybrid prediction model for pipeline corrosion using Artificial Neural Network with Particle Swarm Optimization
Published 2018“…This project aims to develop a hybrid prediction Model which can target specific corrosion damage mechanisms. The basic ANN Model will be improved by integrating the Particle Swarm Optimization (PSO) algorithm to achieve a better and optimal performance. …”
Get full text
Get full text
Article -
17
A hybrid prediction model for pipeline corrosion using Artificial Neural Network with Particle Swarm Optimization
Published 2018“…This project aims to develop a hybrid prediction Model which can target specific corrosion damage mechanisms. The basic ANN Model will be improved by integrating the Particle Swarm Optimization (PSO) algorithm to achieve a better and optimal performance. …”
Get full text
Get full text
Article -
18
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
19
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
20
Performance study of the coexistence of Wireless Sensor Networks (WSN) and Wireless Local Area Networks (WLAN) / Muhammad Adib Haron … [et al.]
Published 2008“…Wireless sensor networks (WSN) are composed of large numbers of tiny networked devices, which are called sensor nodes. …”
Get full text
Get full text
Research Reports
