Search Results - (( java segmentation using algorithm ) OR ( using scheme using algorithm ))
Search alternatives:
- java segmentation »
- using algorithm »
- using scheme »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
3
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Application Of Higher Order Compact Finite Difference Methods To Problems In Fluid Dynamics
Published 2003“…Third, only the numerical algorithm based on Hermitian scheme is used to solve the flow past a backward-facing step. …”
Get full text
Get full text
Thesis -
5
Post quantum signature schemes for the block chain technology
Published 2019“…First we study the different properties and uses of signature schemes, and how Elliptic Curve Digital Signature Algorithm is used in the blockchain technology. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Quality of service management algorithms in WiMAX networks
Published 2015“…In addition, an analytical model for the proposed scheme is developed. Secondly, a Load-Aware Weighted Round Robin algorithm (LAWRR) packet scheduling discipline for downlink traffic in 802.16 networks is proposed to improve the poor performance of scheduling algorithm that use static weights under bursty traffic. …”
Get full text
Get full text
Thesis -
7
Application of Mellin-Kamal transformation in EL Gamal Ciphertext Cryptosystem / Nurul Syazwani Husairi and Nurul Aqilah Mohd Fauzi
Published 2023“…El Gamal ciphertext cryptosystem is one of the fluently used algorithms to satisfy the security message or data transmission. …”
Get full text
Get full text
Student Project -
8
A Fast Scheduling Algorithm for WDM Optical Networks
Published 2000“…These schemes use different criteria to select packets from the nodes for scheduling. …”
Get full text
Get full text
Thesis -
9
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…The research goes on to compare the energy consumptions for encryption and decryption using the AAḃ AAp scheme with similar processes using the Textbook RSA scheme on the aforesaid embedded platforms. …”
Get full text
Get full text
Thesis -
10
-
11
Real-time Cascading Reservoirs Operation using the Genetic Algorithm and Seasonally Varied Models
Published 2013“…The fitness function of the genetic algorithm model (GAM) was to minimize the difference between the potential capacity and actual generation of the scheme. …”
Get full text
Get full text
Thesis -
12
Performance analysis of resource allocation downlink for MIMO-OFDMA system using Greedy algorithm. / Azrinawati Samaon
Published 2014“…Simulation results show that the proposed algorithm can improve the capacity of the network compared with the waterfdling when using signal-to-noise ratio (SNR) with value 6dB. …”
Get full text
Get full text
Article -
13
-
14
A novel steganography algorithm using edge detection and MPC algorithm
Published 2019“…According to the experimental results, the proposed algorithm improves PSNR with at least 5.4 compared to the previous schemes.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Performance analysis of resource allocation downlink for MIMO-OFDMA system using greedy algorithm / Azrinawati Samaon
Published 2016“…Simulation results show that the proposed algorithm can improve the capacity of the network compared with the water-filling when using signal-to-noise ratio (SNR) with value 6dB. …”
Get full text
Get full text
Thesis -
16
A safe overtaking control scheme for autonomous vehicles using rapid-exploration random tree
Published 2022“…The improved algorithm is used to obtain the rough obstacle avoidance of the vehicle. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
17
Efficient algorithms for the key representation auditing scheme.
Published 2009“…Also, cost estimation for this scheme is performed, and we illustrate the saving in block accesses (CPU time) and storage space that are attainable when a KRDB is used.…”
Get full text
Get full text
Citation Index Journal -
18
Iris localisation using Fuzzy Centre Detection (FCD) scheme and active contour snake
Published 2014“…This paper presents a new method to localise iris by using Fuzzy Centre Detection (FCD) scheme and active contour Snake. …”
Get full text
Get full text
Get full text
Article -
19
Dynamic Feedback Flow Control Algorithms for Unicast and Multicast Available Bit Rate Service in Asynchronous Transfer Mode Networks
Published 2000“…Thirdly, the design and implementation issues have been addressed together with the major drawbacks of the previous schemes and hence two algorithms have been proposed. …”
Get full text
Get full text
Thesis -
20
Optimised intelligent tilt controller scheme using genetic algorithms
Published 2006“…This paper presents work on a fuzzy control design for improving the performance of tilting trains with local-per vehicle control, i.e. without employing precedence control.An optimisation procedure using Genetic Algorithms as employed to determine both the best fuzzy output membership function and best PID controller parameters. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
