Search Results - (( code application interface algorithm ) OR ( java application matching algorithm ))
Search alternatives:
- application matching »
- code application »
- java application »
-
1
-
2
Automatic marking system for programming subject
Published 2023“…This application handle execution of anonymous code that could be malicious securely by running the code in an isolate environment. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022Get full text
Get full text
Monograph -
4
Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja
Published 2004“…It has been applied in many practical applications. For most of the cases of the shortest route finding, the Dijkstra's algorithm is known to be an optimal search algorithm. …”
Get full text
Get full text
Thesis -
5
-
6
-
7
Development of finite element model for soil-structure interaction
Published 2014“…In general, application of interface element can well highlight the influence of soil behavior and its consequent effects on the superstructure. …”
Get full text
Get full text
Thesis -
8
-
9
-
10
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…Hashed Message Authentication Code (HMAC) is widely used to provide authenticity, while symmetric encryption algorithms provide confidentiality. …”
Get full text
Get full text
Thesis -
11
Development of a cost efficient vision system for defects detection / Muhammad Zarif Kamarudin
Published 2010“…Programming software is required in order to execute the image acquisition and image analysis algorithm. In this project, MATLAB platform is used to program the entire algorithm furthermore implementing Graphical User Interface to communicate between the vision system and the user. …”
Get full text
Get full text
Monograph -
12
-
13
-
14
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007Get full text
Get full text
Conference or Workshop Item -
15
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
16
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Nonlinear three-dimensional finite elements for composite concrete beams
Published 2012“…The development and application of the interface element to model the interface behaviour between concrete and FRP are still very limited. …”
Get full text
Get full text
Thesis -
18
Development of cost efficient vision system for defects detection / Muhammad Zarif Kamarudin
Published 2010“…The further improvements can be made through lighting design, adding image enhancement algorithm and decision algorithm. Hence, deep understanding of vision system work flow will be obtained thus enhancing advanced sensory application.…”
Get full text
Get full text
Thesis -
19
HUMAN MOTION ANALYSIS IN VIDEO SURVEILLANCE SYSTEM
Published 2019Get full text
Get full text
Final Year Project -
20
Parallelization Of CCSDS Hyperspectral Image Compression Using C++
Published 2018“…In this research, the aim is to design a parallelization algorithm on CCSDS-MHC using Open Multi-Processing (OpenMP), an open-source C++ application programming interface (API). …”
Get full text
Get full text
Monograph
