Search Results - (( code application interface algorithm ) OR ( java application matching algorithm ))

Refine Results
  1. 1
  2. 2

    Automatic marking system for programming subject by Chan, Jin Yee

    Published 2023
    “…This application handle execution of anonymous code that could be malicious securely by running the code in an isolate environment. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3
  4. 4

    Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja by Nurul Hani , Nortaja

    Published 2004
    “…It has been applied in many practical applications. For most of the cases of the shortest route finding, the Dijkstra's algorithm is known to be an optimal search algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7

    Development of finite element model for soil-structure interaction by Shoaei, Mohammad Dalili

    Published 2014
    “…In general, application of interface element can well highlight the influence of soil behavior and its consequent effects on the superstructure. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm by Mohammed Alaidaros, Hashem

    Published 2007
    “…Hashed Message Authentication Code (HMAC) is widely used to provide authenticity, while symmetric encryption algorithms provide confidentiality. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Development of a cost efficient vision system for defects detection / Muhammad Zarif Kamarudin by Kamarudin, Muhammad Zarif

    Published 2010
    “…Programming software is required in order to execute the image acquisition and image analysis algorithm. In this project, MATLAB platform is used to program the entire algorithm furthermore implementing Graphical User Interface to communicate between the vision system and the user. …”
    Get full text
    Get full text
    Monograph
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Nonlinear three-dimensional finite elements for composite concrete beams by Kohnehpooshi, Omid

    Published 2012
    “…The development and application of the interface element to model the interface behaviour between concrete and FRP are still very limited. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Development of cost efficient vision system for defects detection / Muhammad Zarif Kamarudin by Kamarudin, Muhammad Zarif

    Published 2010
    “…The further improvements can be made through lighting design, adding image enhancement algorithm and decision algorithm. Hence, deep understanding of vision system work flow will be obtained thus enhancing advanced sensory application.…”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Parallelization Of CCSDS Hyperspectral Image Compression Using C++ by Tan, Lit Chez

    Published 2018
    “…In this research, the aim is to design a parallelization algorithm on CCSDS-MHC using Open Multi-Processing (OpenMP), an open-source C++ application programming interface (API). …”
    Get full text
    Get full text
    Monograph