Search Results - (( java segmentation using algorithm ) OR ( pair programming modified algorithm ))
Search alternatives:
- programming modified »
- java segmentation »
- pair programming »
- using algorithm »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
3
To improve stemming algorithm on Malay words begin with alphabet B / Norasiah Ismail
Published 2001“…For fourth experiment, a new word is adding in the dictionary and modifies Malay Quran translated. In fifth experiment, the total value for 'a' dictionary in header file "dcvarnew.h" is modifying. …”
Get full text
Get full text
Thesis -
4
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
-
6
Modified firefly algorithm for directional overcurrent relay coordination in power system protection / Muhamad Hatta Hussain
Published 2020“…This thesis presents Modified Firefly Algorithm for Directional Overcurrent Relay Coordination in Power System Protection. …”
Get full text
Get full text
Thesis -
7
To enhance existing Malay stemming algorithm starting with the letter 'D' / Mohd Nazril Hafez Mohd Supandi
Published 2000“…The performance of a Malay stemming algorithm is tested based on words that beginning with 'd', using 4 experiments. …”
Get full text
Get full text
Thesis -
8
The study of stemming algorithm on Malay words that begin with alphabets P, Q, Y, and Z from the translated Al-Quran / Suriani Mat
Published 2001“…The performance of a Malay stemming algorithm is tested based on words beginning with letter 'p', 'q', 'y' and 'z', using 5 experiments. …”
Get full text
Get full text
Thesis -
9
OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA
Published 2004“…Except for 2 additional rotations, each pair of expanded key words is constructed by applying the Twofish round function (with key-dependent). …”
Get full text
Get full text
Final Year Project -
10
Optimization Of Twofish Encryption Algorithm On FPGA
Published 2005“…Except for 2 additional rotations, each pair of expanded key words is constructed by applying the Twofish round function (with key-dependent). …”
Get full text
Conference or Workshop Item -
11
Development Of Distributed Grid-Based Hydrological Model And Floodplain Inundation Management System
Published 2008“…The system has integrated GIS, RS, DEM, data management capability and a dynamic basin model within a common Windows environment. The simulation algorithms of the rainfall-runoff model have operated on grid bases compatible with the MATLAB programming language, which has been used to write instructions to many grid-based operations. …”
Get full text
Get full text
Thesis
