Search Results - (( basic computing ((force algorithm) OR (tree algorithm)) ) OR ( java application a algorithm ))

Refine Results
  1. 1

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4
  5. 5

    Stereo matching algorithm using census transform and segment tree for depth estimation by Hamzah, Rostam Affendi, Zainal Azali, Muhammad Nazmi, Mohd Noh, Zarina, Tengku Wook, Tg Mohd Faisal, Zainal Abidin, Izwan

    Published 2023
    “…Fundamentally, the framework input is the stereo image which represents left and right images respectively. The proposed algorithm in this article has four steps in total, which starts with the matching cost computation using census transform, cost aggregation utilizes segment-tree, optimization using winner-takes-all (WTA) strategy, and post-processing stage uses weighted median filter. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    Tree physiology optimization on SISO and MIMO PID control tuning by Halim, A.H., Ismail, I.

    Published 2018
    “…© 2018 The Natural Computing Applications Forum…”
    Get full text
    Get full text
    Article
  13. 13

    Tree physiology optimization on SISO and MIMO PID control tuning by Halim, A.H., Ismail, I.

    Published 2018
    “…© 2018 The Natural Computing Applications Forum…”
    Get full text
    Get full text
    Article
  14. 14

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
    Get full text
    Get full text
    Final Year Project
  15. 15
  16. 16

    Optical tactile sensor for robotic assisted surface characterization / Amir Abd Latif

    Published 2016
    “…The aim of this research is to develop a new automated technique for an optical tactile sensor in measuring normal and shear force for surface characterization. A new mathematical modelling and computer algorithm is developed and calibrated which are based on image processing methods. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations by Jaafar, Abdullah Mohammed Abdo Ali

    Published 2011
    “…However, most of the existing public-key algorithms are based on complex mathematical computations. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks by Sadeghi, Mohammad Mehdi Gilanian

    Published 2015
    “…To generate, update and distribute the keys for secure communication over IEEE 802.16e, the MBS applies Multicast and Broadcast Rekeying Algorithm (MBRA) as a basic key management algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A proposed algorithm of random vector in measuring similarity for network topology of Bursa Malaysia by Lim, San Yee

    Published 2018
    “…Hence, to ease the calculation process and improve the computational efficiency of RV coefficient, an algorithm is proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20