Search Results - (( modification application usage algorithm ) OR ( java segmentation mining algorithm ))
Search alternatives:
- modification application »
- segmentation mining »
- application usage »
- java segmentation »
- mining algorithm »
- usage algorithm »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
-
3
Bio-inspired computation: Recent development on the modifications of the cuckoo search algorithm
Published 2017“…Presently, the Cuckoo Search algorithm is attracting unprecedented attention from the research community and applications of the algorithm are expected to increase in number rapidly in the future. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. There are four experiment conducted such as processing time, power usage, memory usage and data modification attack. …”
Get full text
Get full text
Thesis -
5
Image authentication using Zernike moment watermarking
Published 2013Get full text
Get full text
Thesis -
6
Resource Minimization in a Real-time Depth-map Processing System on FPGA
Published 2011Get full text
Get full text
Conference or Workshop Item -
7
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…But the major treat of the IPSec is caused by the usage or the algorithm that has weak keys. The algorithms are DES, 3DES, Blowfish, Cast128 and RC5. …”
Get full text
Get full text
Conference or Workshop Item -
8
Maximizing efficiency and sustainability: The role of AI in facility management / Ts. Elma Dewiyana Ismail
Published 2023“…AI can also predict energy usage patterns and optimize energy usage accordingly.…”
Get full text
Get full text
Article -
9
Circular synthetic aperture radar systems for on-the-ground object detection
Published 2012“…SAR concept is applicable in this regard with some modification, especially in terms of movement trajectory. …”
Get full text
Get full text
Thesis -
10
Predicting factors of library traffic for UiTMCTKKT Cendekiawan Library using predictive analytics / Azzatul Husna Abdul Aziz
Published 2025“…They proposed a few minor modifications like improving visualizations and adjusting guidelines for better clarity. …”
Get full text
Get full text
Thesis
