Search Results - (( java segmentation using algorithm ) OR ( using building process algorithm ))

Refine Results
  1. 1

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…Finally, the algorithm found, which would solve the image segmentation problem.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  3. 3
  4. 4

    Clock Distribution Network Building Algorithm For Multiple Ips In System On A Chip by Tan , Tze Liang

    Published 2017
    “…Finally, the global CDN build using the algorithm is evaluated based on the time needed to build the global CDN and the clock buffer numbers and areas used. …”
    Get full text
    Get full text
    Thesis
  5. 5

    High Rise Building Evacuation Route Model Using DIJKSTRA'S Algorithm by Mohd Sabri, Nor Amalina

    Published 2015
    “…This research aims to assist the evacuees to find the shortest path in a high rise building using a shortest path algorithm. The objective is to design and develop an evacuation route using shortest path algorithm based on the evacuation map of the building. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Assessment of CDA and Morphlink-C Algorithms method in crack detection using [Multirotor DJ1 phantom 3] image / Muhammad Hafizi Abd Rahaim by Abd Rahaim, Muhammad Hafizi

    Published 2018
    “…These data model then was evaluated their availability of processed image to detect crack using CDA and MorphLink-C algorithms. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Stereolithography 3D printing development of 3D printing machine controller using the predefined closest-distance volume interpolator system by -, -

    Published 2019
    “…The proposed slicing algorithm uses line-plane intersection model to generate arbitrary line segment when it receives an STL facet. …”
    Get full text
    Get full text
    Research Report
  8. 8

    Consumption-Based Priority Algorithm for Energy Consumption by Ahsan, Matiullah, Zainal, Zainab, Baharom, Md Nor Ramdon, Khalil, Ihsan Ullah, Mohd Ariffin, Azrul, Mohd Jamil, Nor Akmal, Ullah, Irshad, Mehmod, Luqman Hakim, Mohd Yousaf, Mohd Fairouz

    Published 2024
    “…According to recent research, buildings may reduce their energy use by up to 30% via improved operations, which are often based on effective energy management using the load priority algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Consumption-Based Priority Algorithm for Energy Consumption by Ahsan, Matiullah, Zainal, Zainab, Baharom, Md Nor Ramdon, Khalil, Ihsan Ullah, Mohd Ariffin, Azrul, Mohd Jamil, Nor Akmal, Ullah, Irshad, Mehmod, Luqman Hakim, Mohd Yousaf, Mohd Fairouz

    Published 2024
    “…According to recent research, buildings may reduce their energy use by up to 30% via improved operations, which are often based on effective energy management using the load priority algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Contour generation for mask projection stereolithography 3D printing by Faeiz Azizi, Adnan

    Published 2019
    “…The proposed slicing algorithm uses line-plane intersection model to generate arbitrary line segment when it receives an STL facet. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm by Abu Samah, Khyrina Airin Fariza

    Published 2016
    “…Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Consumption-Based Priority Algorithm for Energy Consumption by Ahsan M., Zainal Z., Baharom M.N.R., Khalil I.U., Ariffin A.M., Jamil N.A.M., Ullah I., Mehmod L.H., Yousaf M.F.M.

    Published 2025
    “…According to recent research, buildings may reduce their energy use by up to 30% via improved operations, which are often based on effective energy management using the load priority algorithm. …”
    Article
  13. 13

    Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process by Ali Al-Assadi, Hayder M. A.

    Published 2004
    “…An Intelligent Learning System for the turning process was developed. Visual C++ object-oriented programming language was used to build the Intelligent Learning System for Turning. …”
    Get full text
    Get full text
    Thesis
  14. 14

    SURE-Autometrics algorithm for model selection in multiple equations by Norhayati, Yusof

    Published 2016
    “…Meanwhile, practitioners who are usually non-experts and lack of statistical knowledge will face difficulties during the modelling process. Hence, algorithm with a step by step guidance is beneficial in model building, testing and selection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Information retrieval system (IRS) process on Hansard document / Suraya Saad by Saad, Suraya

    Published 2007
    “…The algorithm will be developed to split the document into few subdocuments by using keywords. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Cryptanalysis in cryptographic algorithm design by Z'aba, Muhammad Reza, Ahmad, Badrisham, Ibrahim, Subariah, Maarof, Mohd. Aizaini

    Published 2006
    “…It also helps the cryptography community in building more secure algorithms.…”
    Get full text
    Conference or Workshop Item
  18. 18

    Sistem navigasi berasaskan algoritma Dijkstra di dalam persekitaran tiga dimensi by Ujang, Muhamad Uznir

    Published 2008
    “…Dijkstra's algorithm is one of the algorithms that could be used in network analysis process especially for 2D shortest route data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20