Search Results - (( process section process algorithm ) OR ( java application matching algorithm ))

Refine Results
  1. 1
  2. 2

    Image pre-processing algorithm for Ficus deltoidea Jack (Moraceae) varietal recognition: a repeated perpendicular line scanning approach by Ahmad Fakhri, Ab. Nasir, M Nordin, A Rahman, Nashriyah, Mat, Abd Rasid, Mamat, Ahmad Shahrizan, Abdul Ghani

    Published 2018
    “…Some of researchers have developed the image pre-processing algorithm to remove petiole section. However, the algorithm was developed using semi-automatic algorithm which is strongly believed to give an inaccurate feature measurement. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    New synchronization protocol for distributed system with TCP extension by Bayat, Peyman

    Published 2013
    “…Faulty processes may cause some other active processes to become inactive during the queuing or within the using a critical section time. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    An improvement on the valiantbrebner hypercube data broadcasting technique / Nasaruddin Zenon by Zenon, Nasaruddin

    Published 1990
    “…In Section 3.0 we will propose a modification to the V-B algorithm. …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    An algorithm to measure unsymmetrical circle shape of intravascular ultrasound image using image processing techniques by Kutty, Suhaili Beeran, O. K. Rahmat, Rahmita Wirza, Kassim, Sazzli Shahlan, Madzin, Hizmawati, Hamdan, Hazlina

    Published 2021
    “…However, the measurement only offers by the existing software and some of the software needs human interaction to complete the process. The purpose of this paper is to present the algorithm to measure the region of interest (ROI) on intravascular ultrasound (IVUS) using an image processing technique. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Loop-based RSA Key Generation Algorithm using String Identity by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman

    Published 2013
    “…Detail explanations of i-RSA algorithm in propose algorithm section. In future, i-RSA algorithm can be improved, so that 100% of email can be a public key. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15
  16. 16
  17. 17

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Optimization of PID Tuning Using Genetic Algorithm by Tengku Ahmad Faris, Ku Yusoff, Mohd Farid, Atan, Nazeri, Abdul Rahman, Shanti Faridah, Salleh, Noraziah, Abdul Wahab

    Published 2015
    “…Thus, the objective of this research is to compare the performance of the conventional tuning method with the performance of tuning method by using genetic algorithm can be seen. Optimization was done on stripping section of distillation column by using genetic algorithm with population size of 20, 40, 60 and 80 and comparing the result with previous optimization using Ziegler-Nichols method. …”
    Get full text
    Get full text
    Article
  19. 19

    Neural Network Based Pattern Recognition in Visual Inspection System for Intergrated Circuit Mark Inspection by Sevamalai, Venantius Kumar

    Published 1998
    “…The time taken for processing was round to be almost linearly related to the ROJ size and not at all effected by the number of sections. …”
    Get full text
    Get full text
    Thesis
  20. 20