Search Results - (( parallel segmentation based algorithm ) OR ( java application matching algorithm ))
Search alternatives:
- parallel segmentation »
- application matching »
- java application »
-
1
-
2
Drone Based Image Processing For Precision Agriculture
Published 2019“…This study proposes a parallel image segmentation algorithm in order to detect the diseased leaf in Coconut, Palm, Banana, Dwarf Palmetto and Sapodilla plants acquire using Parrot PF728000 Anafi Drone with 4K HDR Camera. …”
Get full text
Get full text
Monograph -
3
Colour-Texture Fusion In Image Segmentation For Content-Based Image Retrieval Systems
Published 2007“…The underlying technique is based on the fusion of colour and texture features by a modified fuzzy c-means clustering (FCM) algorithm.…”
Get full text
Get full text
Thesis -
4
-
5
Real-time Rotation Invariant Hand Tracking Using 3D Data
Published 2014“…This paper proposes hand tracking method using hand tracker algorithm released by NiTE, hand’s segmentation method, hand contour detection and center of palm detection. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
An automated multimodal white matter hyperintensities identification in MRI brain images using image processing / Iza Sazanita Isa
Published 2018“…Meanwhile, the segmentation phase utilizes the two-tier segmentation to segregate brain tissues into WM, GM, CSF and WMH. …”
Get full text
Get full text
Book Section -
7
An automated multimodal white matter hyperintensities identification in MRI brain images using image processing / Iza Sazanita Isa
Published 2018“…Meanwhile, the segmentation phase utilizes the two-tier segmentation to segregate brain tissues into WM, GM, CSF and WMH. …”
Get full text
Get full text
Thesis -
8
-
9
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
10
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
Get full text
Get full text
Thesis -
12
-
13
Authenticating sensitive diacritical texts using residual, data representation and pattern matching methods / Saqib Iqbal Hakak
Published 2018“…The searching of halves is achieved through two different algorithms based on the split approach and the parallel approach respectively. …”
Get full text
Get full text
Get full text
Thesis -
14
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis
