Search Results - (( based ((coding using) OR (engine using)) algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- java implication »
- coding using »
-
1
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
Get full text
Get full text
Get full text
Article -
2
Aplikasi rangkaian neural dalam pengesanan simpang bagi penterjemah lakaran pintar
Published 2006“…This research involved three main components - corner detector, chain code, and neural network. The integration of these components produced a corner detector algorithm and this algorithm can be used in the engine of an intelligent sketch interpreter…”
Get full text
Get full text
Thesis -
3
Development of computer aided three-dimensional geometric modeler based on designer's idea in twodimensional
Published 2006“…These algorithm are used to produce chain code series that represented a thinned binary image of the sketch. …”
Get full text
Get full text
Monograph -
4
Expanding the data capacity of QR codes using multiple compression algorithms and base64 encode/decode
Published 2017“…This study focuses on the selection of compression algorithms and use base64 encoder/decoder to increase the capacity of data which is to be stored in the QR code. …”
Get full text
Get full text
Get full text
Article -
5
Detection of head position using chain code algorithm
Published 2007“…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
Get full text
Get full text
Thesis -
6
Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication
Published 2021“…The initial investigation on the existing LDPC code decoding algorithms assists to develop a low complexity LDPC code decoding algorithm. …”
Get full text
Get full text
Get full text
Thesis -
7
-
8
Crow Search Freeman Chain Code (CS-FCC) feature extraction algorithm for handwritten character recognition
Published 2023“…In this research, a Crow Search Algorithm (CSA)-based metaheuristic strategy for feature extraction in HCR was developed. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Enhanced algorithms for three-dimensional object interpreter
Published 2004“…The second is the modified Freeman chain code algorithm that is used to produce chain code series that represented a thinned binary image of the sketch. …”
Get full text
Get full text
Get full text
Thesis -
10
Performance Analysis In IoT Based Home Automation Using Hybrid RS-LDPC Codes
Published 2018“…The thesis proposes an error detection and correction algorithms using Hybrid RS-LDPC codes for the channel encoding and decoding in the home automation system. …”
Get full text
Get full text
Monograph -
11
WAVELET-DCT BASED IMAGE CODER FOR VIDEO CODING APPLICATIONS
Published 2007“…This project is about the implementation ofWavelet-DCT intra-frame coder for video coding applications. Wavelet-DCT is a novel algorithm that uses Forward Discrete Wavelet Transform (DWT) to compute DCT. …”
Get full text
Get full text
Final Year Project -
12
Development of high quality speech compression system for Quranic recitation based on modified CELP algorithm
Published 2013“…Instead of random Gaussian signal, we trained the codebook using LBG algorithm for Surah Al-Fatihah, and used the trained codebook for the whole Quran. …”
Get full text
Get full text
Get full text
Proceeding Paper -
13
Reusability techniques in load-flow analysis computer program
Published 2004“…These methodologies made the developed load-flow analysis software flexible for future enhancement. Adding and changing codes and algorithm of the software can be done without affecting much the existing codes and algorithms. …”
Get full text
Get full text
Article -
14
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
Published 2006Get full text
Get full text
Monograph -
15
ADAPTIVE MODULATION AND CODING FOR WIMAX SYSTEMS
Published 2006“…First the SNR estimation using the three algorithms is implemented in Wimax system, based on the transmission protocols specified in Wimax. …”
Get full text
Get full text
Final Year Project -
16
A comparative review on symmetric and asymmetric dna-based cryptography
Published 2023“…The efficiencies of DNA coding in OTP, RSA, and other algorithms were given. …”
Article -
17
A review of crossover methods and problem representation of genetic algorithm in recent engineering applications
Published 2020“…This paper reviews crossover methods and problem representation, e.g. in the form of binary coded and real coded representation, used by researchers in order to solve engineering operations. …”
Get full text
Get full text
Get full text
Article -
18
Implementation of sinusoidal pulse width modulation based on cordic algorithm using silterra 0.18µm CMOS technology: article
Published 2009“…This thesis presents the implementation of Sinusoidal Pulse Width Modulation (SPWM) using Silterra 0.18µm technology and it is based on CORDIC algorithm. …”
Get full text
Get full text
Article -
19
Performance of MIMO space-time coded system and training based channel estimation for MIMO-OFDM system
Published 2006“…Secondly, it has focused on training based channel estimation algorithm for MIMO-OFDM system. …”
Get full text
Get full text
Thesis -
20
Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm
Published 2014“…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). …”
Get full text
Get full text
Get full text
Proceeding Paper
