Search Results - (( modification application usage algorithm ) OR ( java segmentation using algorithm ))

  • Showing 1 - 12 results of 12
Refine Results
  1. 1

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…Finally, the algorithm found, which would solve the image segmentation problem.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  3. 3
  4. 4

    Bio-inspired computation: Recent development on the modifications of the cuckoo search algorithm by Haruna, Chiroma, Herawan, Tutut, Iztok, Fister Jr, Iztok, Fister, Abdulkareem, Sameem, Shuib, Liyana, Mukhtar, Fatihu Hamza, Younes, Saadi, Abubakar, Adamu

    Published 2017
    “…Presently, the Cuckoo Search algorithm is attracting unprecedented attention from the research community and applications of the algorithm are expected to increase in number rapidly in the future. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil by Shahrul Kamil, Aiman Nurrasyid

    Published 2020
    “…This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. There are four experiment conducted such as processing time, power usage, memory usage and data modification attack. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof by Md Taujuddin, Nik Shahidah Afifi, Abdullah, Abdul Hanan, Maarof, Mohd Aizaini

    Published 2006
    “…But the major treat of the IPSec is caused by the usage or the algorithm that has weak keys. The algorithms are DES, 3DES, Blowfish, Cast128 and RC5. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Maximizing efficiency and sustainability: The role of AI in facility management / Ts. Elma Dewiyana Ismail by Ismail, Elma Dewiyana

    Published 2023
    “…AI can also predict energy usage patterns and optimize energy usage accordingly.…”
    Get full text
    Get full text
    Article
  11. 11

    Circular synthetic aperture radar systems for on-the-ground object detection by Mohammad Poor, Mojtaba

    Published 2012
    “…SAR concept is applicable in this regard with some modification, especially in terms of movement trajectory. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Predicting factors of library traffic for UiTMCTKKT Cendekiawan Library using predictive analytics / Azzatul Husna Abdul Aziz by Abdul Aziz, Azzatul Husna

    Published 2025
    “…They proposed a few minor modifications like improving visualizations and adjusting guidelines for better clarity. …”
    Get full text
    Get full text
    Thesis