Search Results - (( java segmentation using algorithm ) OR ( basic scheme based algorithm ))

Refine Results
  1. 1

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…Finally, the algorithm found, which would solve the image segmentation problem.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Dynamic Feedback Flow Control Algorithms for Unicast and Multicast Available Bit Rate Service in Asynchronous Transfer Mode Networks by Abdelrahman, Ali Mohamed

    Published 2000
    “…A dynamic rate-based flow control (DRFC) scheme has been developed to support ABR service in unicast environment, while an adaptive feedback consolidation (AFC) algorithm has been designed for ABR multicasting. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  4. 4
  5. 5

    An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan by Syed Adnan, Syed Farid

    Published 2019
    “…One such lightweight scheme is the AA-Beta (AAḃ) asymmetric cryptographic scheme whose algorithm consists of only basic arithmetic operations of addition and subtraction for both the encryption and decryption processes. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A new modern scheme for solving fractal–fractional differential equations based on deep feedforward neural network with multiple hidden layer by Admon, Mohd Rashid, Senu, Norazak, Ahmadian, Ali, Majid, Zanariah Abdul, Salahshour, Soheil

    Published 2024
    “…During the initial stage of the method development, the basic framework on solving FFDEs is designed. To minimize the burden of computational time, the vectorized algorithm is constructed at the next stage for method to be performed efficiently. …”
    Get full text
    Get full text
    Article
  7. 7

    A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations by Jaafar, Abdullah Mohammed Abdo Ali

    Published 2011
    “…However, most of the existing public-key algorithms are based on complex mathematical computations. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Development an accurate and stable range-free localization scheme for anisotropic wireless sensor networks by Han, Fengrong

    Published 2022
    “…Accordingly, this study aspires to bridge the research gap by exploring a new DV-Hop algorithm to build a fast, costefficient, strong range-free localization scheme. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Cluster-based spectrum sensing scheme in heterogeneous network by Hasan, Mohammad Kamrul, Ismail, Ahmad Fadzil, Hassan Abdalla Hashim, Aisha, Mohd. Ramli, Huda Adibah, Hashim, Wahidah, Islam, Shayla, Badron, Khairayu

    Published 2014
    “…The proposed SS scheme adopted the basic model of energy detec-tor and compared with cooperative spectrum sensing scheme. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11
  12. 12

    Image watermarking optimization algorithms in transform domains and feature regions by Tao, Hai

    Published 2012
    “…As a result,it will first introduce the theories about the feature extraction and the basic principles on how feature points can act as locating resynchronization between watermark insertion and extraction discussed in detail.Subsequently,it will present several content-based watermark embedding and extraction methods which can be directly implemented based on the synchronization scheme.Further detailed watermarking schemes which combine feature regions extraction with counter propagation neural network-based watermarks synapses memorization are then presented.The performance of watermarking schemes based on framework of feature point shows the following advantages:a)Good imperceptibility. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks by Sadeghi, Mohammad Mehdi Gilanian

    Published 2015
    “…IEEE 802.16e uses multicast and broadcast service (MBS) as an efficient mechanism to distribute the same data concurrently to multiple mobile stations (MSs) through one Base Station. To generate, update and distribute the keys for secure communication over IEEE 802.16e, the MBS applies Multicast and Broadcast Rekeying Algorithm (MBRA) as a basic key management algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    One-dimension high-order compact method for solving euler's equation by Mohamad, Mahmod Abd Hakim bin

    Published 2010
    “…Among those most famous and relevant are based on flux vector splitting and Godunov-type schemes. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    One-dimensional high-order compact method for solving Euler's equations by Mohamad, Mahmod Abd Hakim, Basri, Shahnor, Basuno, Bambang

    Published 2011
    “…Among those most famous and relevant are based on flux vector splitting and Godunov-type schemes. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Development of Automatic Load-Shedding Strategy for Stand-Alone Photovoltaic System by Mohd Nasir, Mohamad Na'im, Mohd Farith, Mashitah, Jamri , Mohd Saifuzam, Jali, Mohd Hafiz, Jaafar, Hazriq Izzuan, Sulaima, Mohamad Fani

    Published 2014
    “…Output of this project can support the DC loads and load-shedding strategy scheme is performed based on the designed algorithm.…”
    Get full text
    Get full text
    Article
  20. 20

    Quality Of Service Provisioning Scheme For Real-Time Applications in IEEE 802.11 Wireless Local Area Network by Ng, Roger Cheng Yong

    Published 2006
    “…The SNT adapts contention parameters of individual ACs based on the network load in a basic service set (BSS). …”
    Get full text
    Get full text
    Thesis