Search Results - (( using vectorisation using algorithm ) OR ( things application using algorithm ))
Search alternatives:
- vectorisation using »
- things application »
- using algorithm »
-
1
3D silhouette rendering algorithms using vectorisation technique from Kedah topography map
Published 2004“…The vectorisation software has been used for producing these data. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
A DNA-dynamic permutation-diffusion algorithm for image encryption using scaling chaotification models and advanced DNA operations
Published 2025“…To evaluate the proposed algorithm, extensive experiments have been conducted, and results have been compared with the latest encryption algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
An Automated System For Classifying Conference Papers
Published 2021“…The Knowledge Discovery in Databases (KDD) process was followed as a formal data mining methodology where 1000 AI conference papers were carefully collected, pre-processed and transformed to numerical representations through TF-IDF vectorisation. A randomised stratified 5- fold cross validation was then applied on several data mining algorithms and evaluated using the F-measure as a metric. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Intelligent Multi-cellular Network Connectivity for Internet of Things Applications
Published 2023Conference Paper -
5
-
6
Security factors based evaluation of verification algorithm for an IoT access system
Published 2023Conference Paper -
7
Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering
Published 2023“…In the initialization stage, the reader uses improved K-means clustering running concurrently with a tag counter algorithm to cluster tags into K groups using tags RN16 while the counter returns an accurate tag number estimate. …”
Get full text
Get full text
Article -
8
Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications
Published 2023Conference Paper -
9
-
10
-
11
A wireless interference-aware internet-of-things gateway placement framework with genetic algorithm approach
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Real-time time series error-based data reduction for internet-of-things applications
Published 2018Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
-
14
Development of Image Recognition for Underwater Vehicle Applications
Published 2011“…It is also expected to recognize biological underwater object to support on deck auto monitoring system. The developed algorithm will be used to recognize relevant underwater object or living thing. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
-
16
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
17
-
18
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
19
Internet of things (IoT) based grid tension monitoring system
Published 2022“…The Internet of things method use in this monitoring system is by using ThingSpeak web and Blynk application. …”
Get full text
Get full text
Undergraduates Project Papers -
20
Two-Phases QR Authentication Algorithm (2PQRA) for Digital Energy and IoT Applications
Published 2023Conference Paper
