Search Results - (( java segmentation using algorithm ) OR ( basic integrated network algorithm ))

Refine Results
  1. 1

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…Finally, the algorithm found, which would solve the image segmentation problem.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Power Delivery Network Modeling And Simulation By Using Delaunay-Voronoi Triangulation And The Latency Insertion Method by Chin, Wei Chun

    Published 2018
    “…However, typical LIM algorithm is facing problem on its stability. Therefore, in the project, modeled power planes are simulated with basic LIM and voltage-in-current formulated LIM. …”
    Get full text
    Get full text
    Monograph
  3. 3

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  4. 4
  5. 5

    An Integrated Approach to the Reduction of Reactive Power Losses in Radial Distribution Network by Than, Khong Hon

    Published 2004
    “…The scope of study would be on the capacitor insertion in radial distribution network. An existing algorithm will be studied and an integrated approach to the reduction ofreactive power losses will be proposed. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Dynamic Feedback Flow Control Algorithms for Unicast and Multicast Available Bit Rate Service in Asynchronous Transfer Mode Networks by Abdelrahman, Ali Mohamed

    Published 2000
    “…Asynchronous transfer mode (ATM) network technology has been adopted to integrate different kinds of traffic, like video, audio and data. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Developing a secure mechanism for Bluetooth-based Wireless Personal Area Networks (WPANs) by Othman, Marini, Hassan, Wan Haslina, Hassan Abdalla Hashim, Aisha

    Published 2007
    “…This paper highlights our work in developing an enhanced security framework for Bluetooth-based wireless personal area networks (WPANs). The basic security architecture of Bluetooth, operating at the link layer, is augmented with a higher application layer security mechanism for authentication and message integrity. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    Optimization of supply chain management by simulation based RFID with XBEE Network by Soomro, Aftab Ahmed

    Published 2015
    “…Thus, its communication range was enhanced by the integration of RFID with XBee (ZigBee) wireless mesh network devices. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    A novel spiral backoff mechanism for wireless sensor networks MAC protocol in smart grid system by Ahmed, Musse Mohamud, Bari, S.M. Sadakatul

    Published 2015
    “…The IEEE 802.15.4 standard provides a basic foundation by defining the physical and MAC layer of the low power wireless sensor network. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Development an accurate and stable range-free localization scheme for anisotropic wireless sensor networks by Han, Fengrong

    Published 2022
    “…This study developed an optimized variation of the DV-Hop localization algorithm for anisotropic wireless sensor networks. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Implementation of UPFC model into fast decoupled load flow by Mokhlis, Hazlie, Nor, K.M.

    Published 2004
    “…By using this approach, the basic Fast decoupled algorithm can be added with functionality to analyze UPFC without the need to modify the whole algorithm, which will require minimum modification. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Heuristic resource allocation algorithm for controller placement in multi-control 5G based on SDN/NFV architecture by Ibrahim, Abeer Abdalla Zakaria, Hashim, Fazirulhisyam, Noordin, Nor Kamariah, Sali, Aduwati, Navaie, Keivan, Fadul, Saber Mohammed Elnour

    Published 2021
    “…The integration of Software Defined Networking (SDN) and Network Function Virtualization (NFV) is considered to be an efficient solution that enables the forecasting of highly scalable, optimal performance of 5G networks by providing an effective means of network functionality. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    Designing an integrated AIOT system for tracking class attendance by Kuak, Xuan Ren

    Published 2024
    “…Further enhancements including integrating of night vision cameras and research on face recognition algorithms that utilizes GPU can improve the system performance. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    A hybrid prediction model for pipeline corrosion using Artificial Neural Network with Particle Swarm Optimization by Ee, L.K., Aziz, I.A.

    Published 2018
    “…This project aims to develop a hybrid prediction Model which can target specific corrosion damage mechanisms. The basic ANN Model will be improved by integrating the Particle Swarm Optimization (PSO) algorithm to achieve a better and optimal performance. …”
    Get full text
    Get full text
    Article
  17. 17

    A hybrid prediction model for pipeline corrosion using Artificial Neural Network with Particle Swarm Optimization by Ee, L.K., Aziz, I.A.

    Published 2018
    “…This project aims to develop a hybrid prediction Model which can target specific corrosion damage mechanisms. The basic ANN Model will be improved by integrating the Particle Swarm Optimization (PSO) algorithm to achieve a better and optimal performance. …”
    Get full text
    Get full text
    Article
  18. 18

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  19. 19

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  20. 20