Search Results - (( (processes OR process) validation using algorithm ) OR ( java application tools algorithm ))
Search alternatives:
- application tools »
- validation using »
- java application »
- using algorithm »
- tools algorithm »
-
1
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
2
-
3
RSA Encryption & Decryption using JAVA
Published 2006“…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
Get full text
Get full text
Final Year Project -
4
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. …”
Get full text
Get full text
Thesis -
5
-
6
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
7
HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION
Published 2011Get full text
Get full text
Thesis -
8
A Test Vector Minimization Algorithm Based On Delta Debugging For Post-Silicon Validation Of Pcie Rootport
Published 2017“…However, manual debugging is still widely used in post-silicon validation and is a major bottleneck in the validation process. …”
Get full text
Get full text
Thesis -
9
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
10
-
11
System identification using Extended Kalman Filter
Published 2017“…In order to evaluate the performance of the EKF learning algorithm, the proposed algorithm validation were analyzed using model validation methods as a checker such as One Step Ahead (OSA) and correlation coefficient (R2). …”
Get full text
Get full text
Student Project -
12
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Initially, this tool adopts only Crow Search, Jaya, and Sine Cosine algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Optimization of multi-holes drilling path using particle swarm optimization
Published 2022“…One way to improve the multi-hole drilling is by optimising the tool path in the process. This research aims to model and optimise multi-hole drilling problems using Particle Swarm Optimisation (PSO) algorithm. …”
Get full text
Get full text
Thesis -
14
Linear-pso with binary search algorithm for DNA motif discovery / Hazaruddin Harun
Published 2015“…Evaluation of these algorithms showed that the results are unsatisfactory due to the lower validity and accuracy of these algorithms. …”
Get full text
Get full text
Thesis -
15
Disparity map algorithm for stereo matching process using local based method
Published 2022“…In conclusion, the proposed SVDM algorithm produces accurate results from the validation process. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking
Published 2012“…The first contribution is automatic detection of seed points which serve as a prerequisite step for centerline extraction algorithm. The solution consists of an algorithm for automatic collection of candidate seed points using efficient grid line searching mechanism and a validation method which uses local geometric and intensity based features as effective validation rules to discriminate between the actual seed point and false alarms. …”
Get full text
Get full text
Thesis -
17
Automatic control of flotation process using computer vision
Published 2015“…The performance of improved marker based watershed algorithm was validated by using several industrial and laboratory froth images. …”
Get full text
Get full text
Thesis -
18
Evaluation and Comparative Analysis of Feature Extraction Methods on Image Data to increase the Accuracy of Classification Algorithms
Published 2024“…The feature extraction methods evaluated were Grayscale Pixel Values, Mean Pixel Value of Channels, and Extracting Edge Features. The classification algorithm used in this research is the Convolutional Neural Network (CNN) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Encrypted email using 3D AES block cipher algorithm / Khairah Mohd Wi
Published 2015“…There are three objective designed: To identify an encrypted email application development of 3D AES block cipher algorithm and hash process, to develop encrypted email using 3D AES process on email and lastly to measure the validity of the encrypted & decrypted email message by comparing the hash value generate before encrypt and after decrypt. …”
Get full text
Get full text
Thesis -
20
Optimization of Multilayer Perceptron (MLP) network training algorithms for agrwood oil quality separation / Noratikah Zawani Mahabob ... [et al.]
Published 2020“…The work was done by using MATLAB version 2017a. The training algorithms were applied to agarwood oil data to classify its compounds to the different quality either in high or low. …”
Get full text
Get full text
Conference or Workshop Item
