The evolution and trend of chain code scheme
Chain code is an image method representation based on region boundaries. The chain code of region is determined by specifying a starting pixel and the sequence of unit vectors obtained from going either left, right, up, or down in moving from pixel to pixel along the boundary. Chain code is widely u...
| Main Authors: | Wulandhari, Lily Ayu, Haron, Habibollah |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Academic Manuscript Central, AMC
2008
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/8535/ http://eprints.utm.my/8535/1/LAWulandhari2008-The_Evolution_and_Trend_of.pdf |
Similar Items
Neural network in corner detection of vertex chain code series
by: Subri, S. H., et al.
Published: (2006)
by: Subri, S. H., et al.
Published: (2006)
Extraction of junctions, lines and regions of irregular line drawing : the chain code processing algorithm
by: Haron, Habibollah, et al.
Published: (2003)
by: Haron, Habibollah, et al.
Published: (2003)
Neural network corner detection of vertex chain code
by: Subri, S. H., et al.
Published: (2006)
by: Subri, S. H., et al.
Published: (2006)
VAP Code: A Secure Graphical Password Scheme for Smart Devices
by: Azad, Saiful, et al.
Published: (2016)
by: Azad, Saiful, et al.
Published: (2016)
Press Code: A Shoulder Surfing Resistant Authentication Scheme for Smart Devices
by: Nur Nadiah Hanim, Mohd Nor, et al.
Published: (2016)
by: Nur Nadiah Hanim, Mohd Nor, et al.
Published: (2016)
Enhanced algorithms for three-dimensional object interpreter
by: Haron, Habibollah
Published: (2004)
by: Haron, Habibollah
Published: (2004)
Press Touch Code: A Finger Press based Screen Size Independent Authentication Scheme for Smart Devices
by: Ranak, M. S. A. Noman, et al.
Published: (2017)
by: Ranak, M. S. A. Noman, et al.
Published: (2017)
Penerbitan Maklumat Tiga Dimensi Sebuah Lukisan Garisan Menggunakan Kaedah Jumlah Kuasa Dua Terkecil
by: Haron, Habibollah, et al.
Published: (2002)
by: Haron, Habibollah, et al.
Published: (2002)
Unravel parking difficulty via relative chain code algorithm / Chan Huey Min
by: Chan , Huey Min
Published: (2005)
by: Chan , Huey Min
Published: (2005)
Comparison between Lamarckian Evolution and Baldwin Evolution of neural network
by: Taha, Imad, et al.
Published: (2006)
by: Taha, Imad, et al.
Published: (2006)
Hybrid Neighbourhood Component Analysis with Gradient Tree Boosting for Feature Selection in Forecasting Crime Rate
by: Khairuddin, Alif Ridzuan, et al.
Published: (2023)
by: Khairuddin, Alif Ridzuan, et al.
Published: (2023)
Secure coding in software development
by: Zainuddin @ Zenah, Nor Harisah, et al.
Published: (2011)
by: Zainuddin @ Zenah, Nor Harisah, et al.
Published: (2011)
Secure coding in cross site scripting
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
CSG Tree : evaluation on performance between solid modelers
by: Romli, Awanis, et al.
Published: (2007)
by: Romli, Awanis, et al.
Published: (2007)
Challenges and Trends of Automatic Text Summarization
by: Foong, Oi Mean, et al.
Published: (2010)
by: Foong, Oi Mean, et al.
Published: (2010)
Comparison and fusion of retrieval schemes based on different structures, similarity measures and weighting schemes
by: Wahlan, Mohammed Salem Farag
Published: (2006)
by: Wahlan, Mohammed Salem Farag
Published: (2006)
Proposal of successive interference cancellation scheme in optical code-division multiple access systems
by: Eltaif, Tawfig, et al.
Published: (2008)
by: Eltaif, Tawfig, et al.
Published: (2008)
The trend of mobile malwares and effective detection techniques
by: Abdul Aziz, Normaziah, et al.
Published: (2015)
by: Abdul Aziz, Normaziah, et al.
Published: (2015)
Current trends strategies in the test redundancy reduction
by: Norasyikin, Safieny, et al.
Published: (2016)
by: Norasyikin, Safieny, et al.
Published: (2016)
Medical certificate verification system using QR code
by: Lai, Chong Lan
Published: (2014)
by: Lai, Chong Lan
Published: (2014)
Differential evolution for neural networks learning enhancement
by: Ismail Wdaa, Abdul Sttar
Published: (2008)
by: Ismail Wdaa, Abdul Sttar
Published: (2008)
An evaluation of traceability approaches to support software evolution
by: Rochimah, S., et al.
Published: (2007)
by: Rochimah, S., et al.
Published: (2007)
Analytical comparison of optical code-division multiple-access systems with and without a successive interference cancellation scheme using modified prime-sequence codes
by: Eltaif, Tawfig, et al.
Published: (2008)
by: Eltaif, Tawfig, et al.
Published: (2008)
Wireless Networks and Security: Issues, Challenges and Research Trends
by: Khan, Shafiullah, et al.
Published: (2012)
by: Khan, Shafiullah, et al.
Published: (2012)
Future trends in security issues in internet and web applications
by: Pathan, Al-Sakib Khan, et al.
Published: (2012)
by: Pathan, Al-Sakib Khan, et al.
Published: (2012)
Wireless sensor network security: Current status and future trends
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Efficient algorithms for the key representation auditing scheme.
by: Asim Abdallah, Elshiekh, et al.
Published: (2009)
by: Asim Abdallah, Elshiekh, et al.
Published: (2009)
On the key revocation schemes in wireless sensor networks
by: Mall, Dieynaba, et al.
Published: (2013)
by: Mall, Dieynaba, et al.
Published: (2013)
Inter-cluster synchronization scheme for femtocell network
by: Hasan, M.K., et al.
Published: (2012)
by: Hasan, M.K., et al.
Published: (2012)
An adaptive scaling factor for multiple watermarking scheme
by: Dhani, Ariatmanto, et al.
Published: (2019)
by: Dhani, Ariatmanto, et al.
Published: (2019)
A Review of Medical Image Watermarking Schemes
by: Jasni, Mohamad Zain, et al.
Published: (2009)
by: Jasni, Mohamad Zain, et al.
Published: (2009)
Secret sharing scheme for collaborative access system
by: Kadir, Rashidah, et al.
Published: (2000)
by: Kadir, Rashidah, et al.
Published: (2000)
Constructing secret sharing schemes based on cyclic
by: Hoo, Mei Hui
Published: (2014)
by: Hoo, Mei Hui
Published: (2014)
Code clone detection using string based tree matching technique
by: Wahid, Norfaradilla
Published: (2008)
by: Wahid, Norfaradilla
Published: (2008)
Network forensics: detection and mitigation of botnet malicious code via darknet
by: R. Othman, R. Azrina, et al.
Published: (2012)
by: R. Othman, R. Azrina, et al.
Published: (2012)
An effective transmit packet coding with trust-based relay nodes in VANETs
by: Hammood, Omar A., et al.
Published: (2020)
by: Hammood, Omar A., et al.
Published: (2020)
Traffic Utilization on Internet Application: Trends and Impact in Student Wireless Network
by: Noraniah, Abdul Aziz, et al.
Published: (2014)
by: Noraniah, Abdul Aziz, et al.
Published: (2014)
Simplified link reliability enhancement schemes for wireless networks
by: Boon, Hoi Lim, et al.
Published: (2009)
by: Boon, Hoi Lim, et al.
Published: (2009)
Optimal cooperative MIMO scheme in wireless sensor networks
by: Ahmad, Mohd Riduan, et al.
Published: (2010)
by: Ahmad, Mohd Riduan, et al.
Published: (2010)
Enhance video quality through VANET based on Transmit Packet Coding (TPC)
by: Hammood, Omar A., et al.
Published: (2018)
by: Hammood, Omar A., et al.
Published: (2018)
Similar Items
-
Neural network in corner detection of vertex chain code series
by: Subri, S. H., et al.
Published: (2006) -
Extraction of junctions, lines and regions of irregular line drawing : the chain code processing algorithm
by: Haron, Habibollah, et al.
Published: (2003) -
Neural network corner detection of vertex chain code
by: Subri, S. H., et al.
Published: (2006) -
VAP Code: A Secure Graphical Password Scheme for Smart Devices
by: Azad, Saiful, et al.
Published: (2016) -
Press Code: A Shoulder Surfing Resistant Authentication Scheme for Smart Devices
by: Nur Nadiah Hanim, Mohd Nor, et al.
Published: (2016)