Search Results - (( java segmentation using algorithm ) OR ( using message pro algorithm ))
Search alternatives:
- java segmentation »
- using algorithm »
- pro algorithm »
- message pro »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
3
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Development of a New Modeling Circuit for the Remote Terminal Unit (RTU) with GSM Communication
Published 2013“…The system has been equipped with microcontroller as a main component which act as an RTU programmed using Microcontroller PRO compiler software. The RTU provides monitoring fault operation, controlling functions and data collection for analysis. …”
Get full text
Get full text
Conference or Workshop Item -
5
Lightweight authentication technique for secure communication of edge/fog data-centers
Published 2020“…The security capability of the proposed scheme has been formally evaluated using the automatic cryptographic analytical tool ProVerif. …”
Get full text
Get full text
Article -
6
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…The third algorithm, named as Pro-Active Intelligence algorithm has inspired autonomous action triggering for each event interoperation, using a control action statement that is generated by SOAP packets required for joint execution of tasks among heterogeneous subsystems. …”
Get full text
Get full text
Thesis -
7
Performance Analysis of Routing Protocols in Resource-Constrained Opportunistic Networks
Published 2019“…We firstly described these protocols and presented their algorithms. Thereafter, we carried out a comparative study of these protocols using exhaustive performance testing experiments with different numbers of nodes, traffic loads, message lifetime, and buffer size. …”
Get full text
Get full text
Get full text
Article -
8
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…Until the end of 20th century, mobile phones are only used to call and to send short message service (sms). …”
Get full text
Get full text
Thesis
