Search Results - (( java segmentation using algorithm ) OR ( basic internet application algorithm ))
Search alternatives:
- application algorithm »
- internet application »
- java segmentation »
- using algorithm »
- basic internet »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
3
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
5
-
6
Simulation Of Token Bucket Algorithm For Network Traffic Performance
Published 2020“…This algorithm has successfully reduced the delay in the network traffic and improve the response time when users request several applications concurrently.…”
Get full text
Get full text
Get full text
Article -
7
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…Upon verification, a demonstration application prototype that performs RSA encryption and decryption is developed using Visual Basic 6.0. …”
Get full text
Get full text
Thesis -
8
Web based applications for energy management system incorporated network reconfiguration using genetic algorithm / Wan Adnan Wan
Published 2006“…Web Based Applications for Energy Management System can be broadly classified into three basic methods. …”
Get full text
Get full text
Thesis -
9
-
10
HybridFlood: minimizing the effects of redundant messages and maximizing search efficiency of unstructured peer-to-peer networks
Published 2014“…Peer-to-peer systems are important Internet applications. A major portion of Internet traffic belongs to such applications. …”
Get full text
Get full text
Get full text
Article -
11
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
12
-
13
An ensemble feature selection method to detect web spam
Published 2018Get full text
Get full text
Get full text
Article -
14
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
Get full text
Get full text
Article -
15
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
Get full text
Get full text
Article -
16
Bundle Sorting Mobile Application
Published 2020“…For the next subsection, illustrates more information on the basic application process and software.…”
Get full text
Get full text
Final Year Project -
17
Designing an integrated AIOT system for tracking class attendance
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
IoT based IMU sensor network for human arm pose estimation / Jahangir Hassan Khan
Published 2019“…The applications can range from Virtual Reality gaming to training industrial robots as well as controlling surgical robots and stroke rehabilitation. …”
Get full text
Get full text
Get full text
Thesis -
19
-
20
Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation
Published 2000“…This thesis focuses on ways to improve the existing solutions in the algorithmic and implementation aspects. For the algorithmic aspect, the basic principles of motion compensated DCT block-based compression scheme was studied. …”
Get full text
Get full text
Thesis
