Search Results - (( java segmentation using algorithm ) OR ( focusing programming modified algorithm ))
Search alternatives:
- focusing programming »
- programming modified »
- java segmentation »
- using algorithm »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
3
Building an Algorithm for Measuring C Programming Assignments Quality
Published 2008“…The focuses of this final report is to provide a clear idea on the development of programming assignment’s quality measurement algorithm. …”
Get full text
Get full text
Final Year Project -
4
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
Early autism spectrum disorder detection using machine learning / Muhammad Shahmi Shahron Nizan
Published 2023“…The project follows a modified waterfall approach, focusing on creating a user-friendly interface and integrating the Random Forest Classification Algorithm for accurate detection. …”
Get full text
Get full text
Thesis -
6
-
7
-
8
Synthesizing agent for Wumpus World / Ainul Azlinda Abu Bakar
Published 2004“…However, a little had focused on developing an agent synthesis. The domain of this thesis is traditional wumpus world that is enhanced and modified to be the synthesizing agent wumpus world. …”
Get full text
Get full text
Thesis -
9
Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis
Published 2024“…This paper presents a comparative analysis of different variants of the RSA cryptosystem, focusing on five specific cryptosystems: RSA, Somsuk-RSA, Modified-RSA (MRSA), Easy Simple Factoring-RSA (ESF-RSA), and Phony-RSA. …”
Get full text
Get full text
Get full text
Article -
10
Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis
Published 2024“…This paper presents a comparative analysis of different variants of the RSA cryptosystem, focusing on five specific cryptosystems: RSA, Somsuk-RSA, Modified-RSA (MRSA), Easy Simple Factoring-RSA (ESF-RSA), and Phony-RSA. …”
Get full text
Get full text
Get full text
Article -
11
An evaluation of Monte Carlo-based hyper-heuristic for interaction testing of industrial embedded software applications.
Published 2020“…Hyper-heuristic is a new methodology for the adaptive hybridization of meta-heuristic algorithms to derive a general algorithm for solving optimization problems. …”
Get full text
Get full text
Get full text
Article -
12
Solving a multi-period inventory routing problem with stochastic unstationary demand rates
Published 2022“…The computational results show that the algorithms that implement this modified formulation can achieve a better optimization result. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Solving a multiperiod inv entory routing problem with stochastic unstationary demand rates
Published 2022“…The computational results show that the algorithms that implement this modified formulation can achieve a better optimization result. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Monitoring and Control of Pressure in a Gas Plant via PID plus Feedforward Controller
Published 2009“…To execute the overall simulation, the controller is built on MATLAB/Simulink/LabVIEW which is a technical computing program that has easily adaptable structure where control strategies and model variables can be modified. …”
Get full text
Get full text
Final Year Project -
15
A study on the efficiency of the object model for a dynamic feedback mechanism in network simulator 2 (NS-2) / Nor Adora Endut, Rozianawaty Osman and Noorazida Mohd Idris
Published 2008“…With CORBA having the overall view of the programming realm as individual objects allowing for interoperability, it offers the possibility to observe NS procedures and algorithms as objects and allow for a remote CORBA client to access these objects to be operated on without the direct access to the NS core itself. …”
Get full text
Get full text
Research Reports -
16
Multiple and solid data background scheme for testing static single cell faults on SRAM memories
Published 2013“…These faults are undetectable by existing algorithms with insufficient operation. To date, the main effort in this field of research is to improve fault detection by modifying or adding an operation sequence in the MTA. …”
Get full text
Get full text
Thesis -
17
Discrete-time system identification using genetic algorithm with single parent-based mating technique
Published 2024“…System identifiction (SI) is a methodology for developing mathematical models of dynamic systems using measurements of input and output signals. This research focuses on improving Genetic Algorithms (GA) for SI, specifically addressing inefficiencies in common crossover operators that limit search space exploration and lead to premature convergence. …”
Get full text
Get full text
Get full text
Thesis -
18
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
19
Numerical simulation and experimental verification on distortions induced by wire-arc additive manufacturing components and costing analysis / Keval Priapratama Prajadhiana
Published 2024“…Once the substrate has been removed, the component distortion comparison is examined by means of modified substrate removal algorithm where the error percentage of the models ranges from 2.96% until 8.05%. …”
Get full text
Get full text
Thesis -
20
Development Of Finite Element Codes For Shear Wall Analysis
Published 2008“…In this study, new elements have been developed, modified constitutive law has been proposed, new computational algorithm has been utilised. …”
Get full text
Get full text
Thesis
