Search Results - (( java segmentation using algorithm ) OR ( using second level algorithm ))
Search alternatives:
- java segmentation »
- using algorithm »
- level algorithm »
- second level »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
3
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Compressing Images Using Multi-Level Wavelet Transform Algorithm (MWTA)
Published 2012“…Multi-levels were used in this study with the aim to produce better results for compressing images.The Multi-level Wavelet Transform Algorithm (MWTA) consists of three phases namely, first level compression, second level compressing in the first level, and algorithm validation by compare.Therefore, Vaishnavi method is used to design and develop the prototype model.In this study, the experiment was conducted using different images (RGB). …”
Get full text
Get full text
Get full text
Thesis -
5
IMPLEMENTATION OF IMAGE TEXTURE ANALYSIS USING GRAY LEVEL RUN LENGTH APPROACH
Published 2006“…MATLAB softwareis used as the main tools in this project to develop both the first and second order algorithms. …”
Get full text
Get full text
Final Year Project -
6
Denoising of digital images using second generation wavelet transforms-hidden markov model
Published 2016“…In this issue, a newly developed algorithm based on second-generation wavelet transformation using semi-soft thresholding is introduced. …”
Get full text
Get full text
Thesis -
7
Two level Differential Evolution algorithms for ARMA parameters estimatio
Published 2013“…The first level searches for the appropriate model order while the second level computes the optimal/sub-optimal corresponding parameters. …”
Get full text
Get full text
Get full text
Proceeding Paper -
8
Second Level Password Generator
Published 2010“…Therefore, it is important to have a second level security to the user's password. Cryptography is an art to convert a message into other forms by using some algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
9
Real-time shadow casting using fake soft shadow volume with stencil buffer
Published 2006“…Comparison using proposed algorithm with an established algorithm revealed that the proposed algorithm is two to five times faster. …”
Get full text
Get full text
Thesis -
10
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Second, an Optimized time sliding window packet marker (OTSWTCM) algorithm. …”
Get full text
Get full text
Thesis -
11
Optimal vehicle to grid planning and scheduling using double layer multi-objective algorithm
Published 2023Article -
12
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
13
Selective harmonic elimination in cascaded H-bridge multilevel inverter using hybrid APSO algorithm / Mudasir Ahmed
Published 2019“…This study presents two efficient hybrid SHEPWM algorithms, one for low and second for high-level inverters to calculate the optimized firing angles. …”
Get full text
Get full text
Get full text
Thesis -
14
Boundary control of a dual-output boost converter with multilevel inverter topology / Messikh Tarek
Published 2017“…A three-level algorithm of SVPWM is implemented in Altera DE2 board to control the three-level inverter which ensures lower hardware resource usage and satisfy the switching time criteria. …”
Get full text
Get full text
Get full text
Thesis -
15
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…In the first and second methods, the visual video information is secured by encrypting limited transformed coefficients using AES algorithm. …”
Get full text
Get full text
Thesis -
16
-
17
A new image scrambling technique using block rotation algorithm based on Rubik’s cube
Published 2013“…The second part of the algorithm uses the rotation table resulted from the first part of the algorithm to generate newly rotated image (Scrambled) in which the rows and the columns of the original image are rotated after divide it to six sub-image and attach then to the faces of the virtual Rubik’s cube . …”
Get full text
Get full text
Get full text
Article -
18
Development of some fast and efficient methods for elliptic curve scalar multiplication over prime fields
Published 2015“…The second proposed algorithm which is using ω - NAF reduced the cost of computation of the ECSM by comparing with using the binary, NAF and ω - NAF algorithm with ω = 3 respectively. …”
Get full text
Get full text
Get full text
Thesis -
19
Dynamic Bayesian networks and variable length genetic algorithm for designing cue-based model for dialogue act recognition
Published 2010“…The model is evaluated against two previously proposed models and the results confirm the potentiality of dynamic Bayesian networks for dialogue act recognition. In the second stage, the developed variable length genetic algorithm is used to select different sets of lexical cues to constitute the dynamic Bayesian networks' random variables. …”
Get full text
Get full text
Article -
20
A new image scrambling approach using block-based on shifted algorithm
Published 2013“…The second part of the algorithm uses the shifted table resulted from the first part of the algorithm to generate newly shifted image (Scrambled) in which the rows and the columns of the original image are shifted. …”
Get full text
Get full text
Get full text
Article
