Search Results - (( parallel segmentation using algorithm ) OR ( java application matching algorithm ))
Search alternatives:
- parallel segmentation »
- application matching »
- java application »
- using algorithm »
-
1
Image Segmentation With Cyclic Load Balanced Parallel Fuzzy C - Means.
Published 2010Get full text
Get full text
Thesis -
2
-
3
Efficient hardware design for palm-dorsa vein image enhancement
Published 2018“…Then, segmentation technique consisting of Difference of Gaussian and threshold are used to segment the veins. …”
Get full text
Get full text
Get full text
Thesis -
4
Drone Based Image Processing For Precision Agriculture
Published 2019“…This study proposes a parallel image segmentation algorithm in order to detect the diseased leaf in Coconut, Palm, Banana, Dwarf Palmetto and Sapodilla plants acquire using Parrot PF728000 Anafi Drone with 4K HDR Camera. …”
Get full text
Get full text
Monograph -
5
Speeding up index construction with GPU for DNA data sequences
Published 2011“…Graphic processor unit (GPU) is used to parallelize a segment of an indexing algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Quantification and segmentation of breast cancer diagnosis: efficient hardware accelerator approach
Published 2022“…In addition, a new image clustering algorithm anticipates the need for largescale serial and parallel processing. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Real-time Rotation Invariant Hand Tracking Using 3D Data
Published 2014“…This paper proposes hand tracking method using hand tracker algorithm released by NiTE, hand’s segmentation method, hand contour detection and center of palm detection. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
-
9
-
10
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
11
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
An automated multimodal white matter hyperintensities identification in MRI brain images using image processing / Iza Sazanita Isa
Published 2018“…The first stage is preprocessing procedure that combines the thresholding and filtering algorithm for pre processing the MRI images while the second stage contains two phases of main processing techniques of enhancement and segmentation. …”
Get full text
Get full text
Book Section -
13
An automated multimodal white matter hyperintensities identification in MRI brain images using image processing / Iza Sazanita Isa
Published 2018“…The first stage is preprocessing procedure that combines the thresholding and filtering algorithm for pre processing the MRI images while the second stage contains two phases of main processing techniques of enhancement and segmentation. …”
Get full text
Get full text
Thesis -
14
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…The algorithms were examined on two real datasets, namely, NSL-KDD and Landsat. …”
Get full text
Get full text
Thesis -
15
-
16
Hybrid intelligent methods for parameter identification and load frequency control in power system
Published 2014“…Meanwhile, part two presents three developed control methods for FLC from the improvement of fuzzy control (named as scaled fuzzy using PSO, parallel conventional PI/PD with Scaled Fuzzy PI/PD and Mirror Fuzzy controller) by adapting the utilization of PSO to optimize the scaled gain of fuzzy controllers. …”
Get full text
Get full text
Thesis -
17
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis -
18
Authenticating sensitive diacritical texts using residual, data representation and pattern matching methods / Saqib Iqbal Hakak
Published 2018“…The objective is achieved using logical operations and the character segmentation. …”
Get full text
Get full text
Get full text
Thesis
