Search Results - (( parallel segmentation based algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    Drone Based Image Processing For Precision Agriculture by Sharif, Muhammad Arif Syafiq Md

    Published 2019
    “…This study proposes a parallel image segmentation algorithm in order to detect the diseased leaf in Coconut, Palm, Banana, Dwarf Palmetto and Sapodilla plants acquire using Parrot PF728000 Anafi Drone with 4K HDR Camera. …”
    Get full text
    Get full text
    Monograph
  2. 2

    Colour-Texture Fusion In Image Segmentation For Content-Based Image Retrieval Systems by Ooi , Woi Seng

    Published 2007
    “…The underlying technique is based on the fusion of colour and texture features by a modified fuzzy c-means clustering (FCM) algorithm.…”
    Get full text
    Get full text
    Thesis
  3. 3

    Real-time Rotation Invariant Hand Tracking Using 3D Data by Rosdiyana, Samad, M. Zabri, Abu Bakar, Pebrianti, Dwi, Nicolaas Lim, Yong Aan

    Published 2014
    “…This paper proposes hand tracking method using hand tracker algorithm released by NiTE, hand’s segmentation method, hand contour detection and center of palm detection. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    An automated multimodal white matter hyperintensities identification in MRI brain images using image processing / Iza Sazanita Isa by Isa, Iza Sazanita

    Published 2018
    “…Meanwhile, the segmentation phase utilizes the two-tier segmentation to segregate brain tissues into WM, GM, CSF and WMH. …”
    Get full text
    Get full text
    Book Section
  5. 5

    An automated multimodal white matter hyperintensities identification in MRI brain images using image processing / Iza Sazanita Isa by Isa, Iza Sazanita

    Published 2018
    “…Meanwhile, the segmentation phase utilizes the two-tier segmentation to segregate brain tissues into WM, GM, CSF and WMH. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Authenticating sensitive diacritical texts using residual, data representation and pattern matching methods / Saqib Iqbal Hakak by Saqib Iqbal , Hakak

    Published 2018
    “…The searching of halves is achieved through two different algorithms based on the split approach and the parallel approach respectively. …”
    Get full text
    Get full text
    Get full text
    Thesis