Search Results - (( problem segmentation mining algorithm ) OR ( java applications cloud algorithm ))

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The developed patterns are applied in the field of real-time analysis. Finally, the algorithm found, which would solve the image segmentation problem.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Denoising histological images for a better colour image segmentation / Sulastri Putit by Putit, Sulastri

    Published 2013
    “…The preservation of relevant image information is important especially in medical context. The problem statements of the study have been defined as the problem of noise, the problem of colour image segmentation and the problem of conventional method in preparing histological images for analysis. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…The approach of the mobile cloud is clearly occurring with web host servers expands thus large number of data around the world stored in huge servers, consumers of mobile devices and small computing devices have high performance expectations usually, therefore mobile cloud computing theorizes that the cloud will soon become a disruptive force in the mobile world, eventually becoming the dominant way in which mobile applications operates. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis