Search Results - (( java segmentation using algorithm ) OR ( using scheme using algorithm ))

Refine Results
  1. 1

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…Finally, the algorithm found, which would solve the image segmentation problem.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  3. 3
  4. 4

    Application Of Higher Order Compact Finite Difference Methods To Problems In Fluid Dynamics by Yap, Wen Jiun

    Published 2003
    “…Third, only the numerical algorithm based on Hermitian scheme is used to solve the flow past a backward-facing step. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Post quantum signature schemes for the block chain technology by Wu, Zi Feng

    Published 2019
    “…First we study the different properties and uses of signature schemes, and how Elliptic Curve Digital Signature Algorithm is used in the blockchain technology. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Quality of service management algorithms in WiMAX networks by Saidu, Ibrahim

    Published 2015
    “…In addition, an analytical model for the proposed scheme is developed. Secondly, a Load-Aware Weighted Round Robin algorithm (LAWRR) packet scheduling discipline for downlink traffic in 802.16 networks is proposed to improve the poor performance of scheduling algorithm that use static weights under bursty traffic. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Application of Mellin-Kamal transformation in EL Gamal Ciphertext Cryptosystem / Nurul Syazwani Husairi and Nurul Aqilah Mohd Fauzi by Husairi, Nurul Syazwani, Mohd Fauzi, Nurul Aqilah

    Published 2023
    “…El Gamal ciphertext cryptosystem is one of the fluently used algorithms to satisfy the security message or data transmission. …”
    Get full text
    Get full text
    Student Project
  8. 8

    A Fast Scheduling Algorithm for WDM Optical Networks by Cheah, Cheng Lai

    Published 2000
    “…These schemes use different criteria to select packets from the nodes for scheduling. …”
    Get full text
    Get full text
    Thesis
  9. 9

    An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan by Syed Adnan, Syed Farid

    Published 2019
    “…The research goes on to compare the energy consumptions for encryption and decryption using the AAḃ AAp scheme with similar processes using the Textbook RSA scheme on the aforesaid embedded platforms. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Real-time Cascading Reservoirs Operation using the Genetic Algorithm and Seasonally Varied Models by DERIB ASFAW, TILAHUN

    Published 2013
    “…The fitness function of the genetic algorithm model (GAM) was to minimize the difference between the potential capacity and actual generation of the scheme. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Performance analysis of resource allocation downlink for MIMO-OFDMA system using Greedy algorithm. / Azrinawati Samaon by Samaon, Azrinawati

    Published 2014
    “…Simulation results show that the proposed algorithm can improve the capacity of the network compared with the waterfdling when using signal-to-noise ratio (SNR) with value 6dB. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    A novel steganography algorithm using edge detection and MPC algorithm by Aref Rezaei, Leili Farzinvash, Ali Farzamnia

    Published 2019
    “…According to the experimental results, the proposed algorithm improves PSNR with at least 5.4 compared to the previous schemes.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Performance analysis of resource allocation downlink for MIMO-OFDMA system using greedy algorithm / Azrinawati Samaon by Samaon, Azrinawati

    Published 2016
    “…Simulation results show that the proposed algorithm can improve the capacity of the network compared with the water-filling when using signal-to-noise ratio (SNR) with value 6dB. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Efficient algorithms for the key representation auditing scheme. by Asim Abdallah, Elshiekh, Dominic P, Dhanapal Durai

    Published 2009
    “…Also, cost estimation for this scheme is performed, and we illustrate the saving in block accesses (CPU time) and storage space that are attainable when a KRDB is used.…”
    Get full text
    Get full text
    Citation Index Journal
  18. 18

    Iris localisation using Fuzzy Centre Detection (FCD) scheme and active contour snake by Mat Ibrahim, Masrullizam, Soraghan , John, Abd Manap, Nurulfajar

    Published 2014
    “…This paper presents a new method to localise iris by using Fuzzy Centre Detection (FCD) scheme and active contour Snake. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Dynamic Feedback Flow Control Algorithms for Unicast and Multicast Available Bit Rate Service in Asynchronous Transfer Mode Networks by Abdelrahman, Ali Mohamed

    Published 2000
    “…Thirdly, the design and implementation issues have been addressed together with the major drawbacks of the previous schemes and hence two algorithms have been proposed. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Optimised intelligent tilt controller scheme using genetic algorithms by Zamzuri, Hairi, Zolotas, Argyrios, Goodall, Roger

    Published 2006
    “…This paper presents work on a fuzzy control design for improving the performance of tilting trains with local-per vehicle control, i.e. without employing precedence control.An optimisation procedure using Genetic Algorithms as employed to determine both the best fuzzy output membership function and best PID controller parameters. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item