Search Results - (( parallel segmentation based algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- parallel segmentation »
- java application »
-
1
Drone Based Image Processing For Precision Agriculture
Published 2019“…This study proposes a parallel image segmentation algorithm in order to detect the diseased leaf in Coconut, Palm, Banana, Dwarf Palmetto and Sapodilla plants acquire using Parrot PF728000 Anafi Drone with 4K HDR Camera. …”
Get full text
Get full text
Monograph -
2
Colour-Texture Fusion In Image Segmentation For Content-Based Image Retrieval Systems
Published 2007“…The underlying technique is based on the fusion of colour and texture features by a modified fuzzy c-means clustering (FCM) algorithm.…”
Get full text
Get full text
Thesis -
3
Real-time Rotation Invariant Hand Tracking Using 3D Data
Published 2014“…This paper proposes hand tracking method using hand tracker algorithm released by NiTE, hand’s segmentation method, hand contour detection and center of palm detection. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
An automated multimodal white matter hyperintensities identification in MRI brain images using image processing / Iza Sazanita Isa
Published 2018“…Meanwhile, the segmentation phase utilizes the two-tier segmentation to segregate brain tissues into WM, GM, CSF and WMH. …”
Get full text
Get full text
Book Section -
5
An automated multimodal white matter hyperintensities identification in MRI brain images using image processing / Iza Sazanita Isa
Published 2018“…Meanwhile, the segmentation phase utilizes the two-tier segmentation to segregate brain tissues into WM, GM, CSF and WMH. …”
Get full text
Get full text
Thesis -
6
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
Get full text
Get full text
Thesis -
7
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
8
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Authenticating sensitive diacritical texts using residual, data representation and pattern matching methods / Saqib Iqbal Hakak
Published 2018“…The searching of halves is achieved through two different algorithms based on the split approach and the parallel approach respectively. …”
Get full text
Get full text
Get full text
Thesis
