Search Results - (( java segmentation using algorithm ) OR ( programmes based optimisation algorithm ))
Search alternatives:
- optimisation algorithm »
- based optimisation »
- java segmentation »
- programmes based »
- using algorithm »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
3
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
-
5
Investigating The Performance Of Metaheuristics To Optimize The Revenue Of Semiconductor Supply Chain
Published 2022“…Investigating the performance of metaheuristics to optimise the revenue of the semiconductor supply chain is the final year project that focuses on to identify the supply chain shortage problem related to semiconductors and to compare among the 20 metaheuristics algorithm optimization programmes capable of optimising the semiconductor supply chain. …”
Get full text
Get full text
Monograph -
6
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
7
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Using genetic algorithms to optimise land use suitability
Published 2012Get full text
Get full text
Thesis -
9
Primary care provider’s barriers to effective management of apparently resistant hypertension in Malaysian public primary health care and strategies to overcome them: a qualitative...
Published 2026“…Theme 4: Strategies to overcome barriers (Subthemes: engaging family members and caregivers, simplifying out-of-office BP monitoring, optimising clinic appointment scheduling and virtual consultations, establishing multidisciplinary team-based care, professional capacity building, standardising referral algorithms, enhancing patient education materials and programmes, strengthening continuity of care, and improving access to FDC antihypertensive medications). …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Implementation of luo-rudi phase 1 cardiac cell excitation model in FPGA
Published 2017“…By implementing the constructed algorithm into the high performance FPGA system, a new real-time simulation-based analysis technique of cardiac electrical excitation has been successfully developed.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
-
12
Prediction accuracy improvement for Bitcoin market prices based on symmetric volatility information using artificial neural network approach
Published 2020“…The study uses Rapid-Miner programme based on artificial neural network (ANN) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
13
Efficient reconfigurable architectures for 3-D medical image compression
Published 2010“…Despite their advantages, most 3-D medical imaging algorithms are computationally intensive with matrix transformation as the most fundamental operation involved in the transform-based methods. …”
Get full text
Get full text
Thesis
