Search Results - (( network implementation software algorithm ) OR ( java segmentation using algorithm ))
Search alternatives:
- implementation software »
- network implementation »
- software algorithm »
- java segmentation »
- using algorithm »
-
1
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
2
Cohesive token passing algorithm utilizing software agents
Published 2010“…This encompasses the implementation in the area of Wave Division Multiplexing (WDM) networks and Mobile Adhoc Networks (MANET). …”
Get full text
Get full text
Article -
3
Security mechanism for wireless Mobile Ad Hoc Networks (MANET)
Published 2006“…The One Time Pad algorithm and Caesar Cipher algorithms are implemented using LabVIEW software. …”
Get full text
Get full text
Student Project -
4
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE
Published 2019“…It is implemented using Verilog HDL software and simulated using the ModelSim software. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
6
Fiber-Wireless testbed using software defined radio for protocol and algorithm testing
Published 2023“…The results show that algorithms implemented in the testbed are in-line with the expected results. …”
Article -
7
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. The algorithm was written in Python programming language to be implementing on a POX controller. …”
Get full text
Get full text
Thesis -
8
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
Implementing artificial neural networks and genetic algorithms to solve modeling and optimisation of biogas production
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Training functional link neural network with ant lion optimizer
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. …”
Get full text
Get full text
Proceeding Paper -
12
Letter recognition using backpropagation algorithm
Published 2010“…The objective of tbi project is to implement Backpropagation Neural Network for letter recognition task. …”
Get full text
Get full text
Undergraduates Project Papers -
13
-
14
Multi-Backpropagation network
Published 2002“…The learning mechanism for Neural Network is its learning algorithm. Backpropagation (or backprop) algorithm is one of the well-known algorithms in neural networks. …”
Get full text
Get full text
Conference or Workshop Item -
15
-
16
Implementing artificial neural networks and genetic algorithms to solve modeling and optimisation of blogas production
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation
Published 2000“…For the implementation aspect, software-driven media processing was studied. …”
Get full text
Get full text
Thesis -
18
DESIGN AND IMPLEMENTATION OF RIPEMD-160 HASH FUNCTION USING VERILOG HDL
Published 2022“…It is implemented using Verilog HDL software and simulated using the ModelSim software. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
19
Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security
Published 2000“…This paper presents a pipeline implementation of the Secure Hash Algorithm, SUA-I. This design is targeted for the Altera FlexlOKE50 Field Programmable Gate Array (FPGA) on a PCI card. …”
Get full text
Get full text
Conference or Workshop Item -
20
Software Development For Conversion Of Ip To Wireless Atm (Watm)
Published 2002“…The project considers the various aspects of carrying IP over a WATM channel, by retransforming the IP data to a WATM cell, ready to be transmitted over a wireless channel.Analysis and simulation shows various advantages and disadvantages in the above-mentioned method when performed using software. Furthermore, discussion about the hardware methods of implementing communication protocols shows a way for the engineer to choose the right method for his future development of the protocols for implementation. …”
Get full text
Get full text
Thesis
