Search Results - (( java segmentation using algorithm ) OR ( using practical protocol algorithm ))

Refine Results
  1. 1

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…Finally, the algorithm found, which would solve the image segmentation problem.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  3. 3
  4. 4

    Routine insulin sliding scale protocol versus software driven algorithm (star protocol) for blood glucose management of critically ill patients in the ICU: A prospective observatio... by Tan, Ru Yi

    Published 2018
    “…Hence, further work and research in the area of software development and customisation to local epidemiology is required to validate it for use in our clinical practice.…”
    Get full text
    Get full text
    Thesis
  5. 5

    Performance enhancement of adaptive cluster formation and routing protocols in wireless networks by Khalaf, Osamah Ibrahem

    Published 2017
    “…EBCRA solves the issue of redundant re-transmission of RREQ packet and propose a routing algorithm that deal with the broadcast storm problem which is widely practiced in MANET routing protocol. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9

    Enhancement of Security Architecture for Smartcard Based Authentication Protocols by Mohammed, Lawan Ahmed

    Published 2004
    “…In particular, important issues such as how smartcard applications can be modeled using UML techniques and how UML can be used to sketch the operations for implementing a secure access using smartcard has been addressed.…”
    Get full text
    Get full text
    Thesis
  10. 10

    A protocol for developing a classification system of mosquitoes using transfer learning by Pradeep Isawasan, Zetty Ilham Abdullah, Ong, Song Quan, Khairulliza Ahmad Salleh

    Published 2022
    “…This protocol target on the domain expert such as entomologist and public health practices to develop their own model to solve the task of mosquito/insect classification.…”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Optimal forwarding routing protocol in ipv6-based wireless sensor network by Jamil, Ansar

    Published 2009
    “…In WSNs, TinyOS is the most widely used operating system. Thus, programming code of the OF routing protocol algorithm is written using NesC language, which is a high level programming language that emulates the syntax and functionality of hardware description languages, and provides components for communication, thread coordination, and hardware abstraction. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Genetic Algorithm based Chain Leader Election in Wireless Sensor Network for Precision Farming by Hamzarul Alif Hamzah, Norah Tuah, Lim, Kit Guan, Tan, Min Keng, Ismail Saad, Tze, Kenneth,Kin Teo

    Published 2020
    “…The energy management issue in WSN has gained attention of scholars, leading to new protocols or schemes developed over the years. Conventionally, PEGASIS protocol selects chain leader without considering the distance and residual energy level of each sensor node. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Efficient data delivery in dense reader environment of passive sensor network by Nawaz, F., Jeoti, V.

    Published 2020
    “…GREEN protocol even works in DRE producing high packet transmission percentage because the protocol arrangement is used with the network coding and retransmission request capabilities. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    On the sequences ri, si, ti ∈ ℤ related to extended Euclidean algorithm and continued fractions by Muhammad, Khairun Nisak, Kamarulhaili, Hailiza

    Published 2016
    “…The extended Euclidean Algorithm is a practical technique used in many cryptographic applications, where it computes the sequences ri, si, ti ∈ ℤ that always satisfy ri = si a+ tib. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Impact of BPL penalty functions and PSF models in PET/CT radial spatial resolution recovery by Si, Wang Jie

    Published 2024
    “…Since National Cancer Institute (NCI) currently practice OSEM+TOF+PSF+BPL (β 450) as the in-house protocol, this study explores alternative BPL and PSF functions in OSEM to enhance spatial resolution and determine optimal β values for NCI's routine clinical use. …”
    Get full text
    Get full text
    Monograph
  17. 17

    The enhanced fault-tolerant AODV routing protocol for Wireless Sensor Network by Che-Aron, Zamree, Mohammed Al-Khateeb, Wajdi Fawzi, Anwar, Farhat

    Published 2010
    “…In this paper, we address the reliability issue by designing an enhanced fault-tolerant mechanism for Ad hoc On-Demand Distance Vector (AODV) routing protocol used in WSN called the ENhancement of FAult Tolerant (ENFAT) ADOV routing protocol. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18
  19. 19
  20. 20

    Secure lightweight client for cloud-based E-Health Model by Zhang, Xiaowei

    Published 2023
    “…This protocol enables the client to transfer its computational operations to a specified proxy server securely. …”
    Get full text
    Get full text
    Get full text
    Thesis