Search Results - (( java segmentation using algorithm ) OR ( program mobility tree algorithm ))
Search alternatives:
- java segmentation »
- program mobility »
- using algorithm »
- tree algorithm »
-
1
Mobile Learning: An Application Prototype for AVL Tree Learning Object
Published 2010“…This project focuses on the design and development of an AVL tree learning object for tertiary students by utilizing current mobile phone features such as mobility, multimedia capability and connectivity. …”
Get full text
Get full text
Conference or Workshop Item -
2
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Mobile Learning: An Application Prototype for AVL Tree Learning Object
Published 2010“…This project focuses on the design and development of an AVL tree learning object for tertiary students by utilizing current mobile phone features such as mobility, multimedia capability and connectivity. …”
Get full text
Get full text
Get full text
Article -
4
A new mobile botnet classification based on permission and API calls
Published 2024Subjects:Conference Paper -
5
Bringing order in segments for a robust network in mobile services
Published 2015Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
7
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Empirical study on intelligent android malware detection based on supervised machine learning
Published 2020“…In recent years, several Android malware applications were developed to perform certain illegitimate activities and harmful actions on mobile devices. In response, specific tools and anti-virus programs used conventional signature-based methods in order to detect such Android malware applications. …”
Get full text
Get full text
Get full text
Get full text
Article
