Search Results - (( java segmentation using algorithm ) OR ( program information cloud algorithm ))
Search alternatives:
- program information »
- java segmentation »
- information cloud »
- using algorithm »
- cloud algorithm »
-
1
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…Utilization of a solitary algorithm is not powerful for extra ordinary state security to information in cloud computing. …”
Get full text
Get full text
Get full text
Thesis -
2
Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms
Published 2019“…The importance of cloud computing comes out with the security of data accessibility, reliability and reliability of information. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013Get full text
Get full text
Research Reports -
4
-
5
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
7
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari
Published 2017“…The results from this research have proved that the AES is very effective in terms of time taken to encrypt and decrypt documents, strength of the algorithm and the reliability of the program. It is recommended that Final Examination Question Papers be enhanced using Encryptor Application by applying AES on a different domain to further strengthen information security.…”
Get full text
Get full text
Thesis -
9
Critical insight for MAPReduce optimization in Hadoop
Published 2014Get full text
Get full text
Get full text
Article -
10
Automatic extraction of digital terrain model and Building Footprint from airborne LiDAR data using rule-based learning techniques
Published 2021“…Topographic information such as feature maps and digital terrain models (DTM) has always been a basic requirement in many engineering sciences. …”
Get full text
Get full text
Get full text
Thesis -
11
A Framework for Green Energy Resources Identification and Integration Supported by Real-Time Monitoring, Control, and Automation Applications
Published 2025“…Following site identification, an improved Geographical Information System-driven fuzzy Traveling Salesman Problem-Binary Integer Programming algorithm was proposed to integrate these sites into a reliable ring-based system topology, aiming to achieve a zero-carbon footprint. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
-
13
Development of unmanned surface vehicle with real-time water quality monitoring system
Published 2023“…The USV also developed with auto navigation through all the targeted area by using GPS coordinate and path planning algorithm programmed in the USV controller. In this project, we use the IoT application to store data in the cloud and to dispense the information. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Membership function model for defining optimality of vapor pressure deficit in closed-field cultivation of tomato
Published 2016“…An incremental algorithm was written in MATLAB© based on definitive concepts in VPD equations and the GR model. …”
Get full text
Get full text
Get full text
Article -
15
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The proposed schemes have been validated using informal and formal security verification to compare the achieved security features against various attacks. …”
Get full text
Get full text
Thesis
