Search Results - (( java segmentation using algorithm ) OR ( using second level algorithm ))

Refine Results
  1. 1

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…Finally, the algorithm found, which would solve the image segmentation problem.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  3. 3
  4. 4

    Compressing Images Using Multi-Level Wavelet Transform Algorithm (MWTA) by Odeh, Ali Ahmad Alabd Abu

    Published 2012
    “…Multi-levels were used in this study with the aim to produce better results for compressing images.The Multi-level Wavelet Transform Algorithm (MWTA) consists of three phases namely, first level compression, second level compressing in the first level, and algorithm validation by compare.Therefore, Vaishnavi method is used to design and develop the prototype model.In this study, the experiment was conducted using different images (RGB). …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    IMPLEMENTATION OF IMAGE TEXTURE ANALYSIS USING GRAY LEVEL RUN LENGTH APPROACH by MOHD YAKOP, SITI HAJAR

    Published 2006
    “…MATLAB softwareis used as the main tools in this project to develop both the first and second order algorithms. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Denoising of digital images using second generation wavelet transforms-hidden markov model by Khmag, Asem Ib Mohamed

    Published 2016
    “…In this issue, a newly developed algorithm based on second-generation wavelet transformation using semi-soft thresholding is introduced. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Two level Differential Evolution algorithms for ARMA parameters estimatio by Salami, Momoh Jimoh Emiyoka, Tijani, Ismaila, Aibinu, Abiodun Musa

    Published 2013
    “…The first level searches for the appropriate model order while the second level computes the optimal/sub-optimal corresponding parameters. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    Second Level Password Generator by Tay, Choo Chuan, Sakidin, Hamzah, Herman, Nanna Suryana, Baharon, Mohd Rizuan

    Published 2010
    “…Therefore, it is important to have a second level security to the user's password. Cryptography is an art to convert a message into other forms by using some algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Real-time shadow casting using fake soft shadow volume with stencil buffer by Lee, Kong Weng

    Published 2006
    “…Comparison using proposed algorithm with an established algorithm revealed that the proposed algorithm is two to five times faster. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…Second, an Optimized time sliding window packet marker (OTSWTCM) algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    Selective harmonic elimination in cascaded H-bridge multilevel inverter using hybrid APSO algorithm / Mudasir Ahmed by Mudasir , Ahmed

    Published 2019
    “…This study presents two efficient hybrid SHEPWM algorithms, one for low and second for high-level inverters to calculate the optimized firing angles. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Boundary control of a dual-output boost converter with multilevel inverter topology / Messikh Tarek by Messikh, Tarek

    Published 2017
    “…A three-level algorithm of SVPWM is implemented in Altera DE2 board to control the three-level inverter which ensures lower hardware resource usage and satisfy the switching time criteria. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh by Mohammed Saleh, Mohammed Ahmed

    Published 2016
    “…In the first and second methods, the visual video information is secured by encrypting limited transformed coefficients using AES algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    A new image scrambling technique using block rotation algorithm based on Rubik’s cube by Abugharsa, Ahmed Bashir, Hasan Basari, Abd Samad, Almangush, Hamida

    Published 2013
    “…The second part of the algorithm uses the rotation table resulted from the first part of the algorithm to generate newly rotated image (Scrambled) in which the rows and the columns of the original image are rotated after divide it to six sub-image and attach then to the faces of the virtual Rubik’s cube . …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Development of some fast and efficient methods for elliptic curve scalar multiplication over prime fields by Al-Saffar, Najlae Falah Hameed

    Published 2015
    “…The second proposed algorithm which is using ω - NAF reduced the cost of computation of the ECSM by comparing with using the binary, NAF and ω - NAF algorithm with ω = 3 respectively. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Dynamic Bayesian networks and variable length genetic algorithm for designing cue-based model for dialogue act recognition by Yahya, Anwar Ali, Mahmod, Ramlan, Ramli, Abd Rahman

    Published 2010
    “…The model is evaluated against two previously proposed models and the results confirm the potentiality of dynamic Bayesian networks for dialogue act recognition. In the second stage, the developed variable length genetic algorithm is used to select different sets of lexical cues to constitute the dynamic Bayesian networks' random variables. …”
    Get full text
    Get full text
    Article
  20. 20

    A new image scrambling approach using block-based on shifted algorithm by Abugharsa, Ahmed Bashir, Hasan Basari, Abd Samad, Almangush, Hamida

    Published 2013
    “…The second part of the algorithm uses the shifted table resulted from the first part of the algorithm to generate newly shifted image (Scrambled) in which the rows and the columns of the original image are shifted. …”
    Get full text
    Get full text
    Get full text
    Article