Search Results - (( code application window algorithm ) OR ( java application ant algorithm ))
Search alternatives:
- application window »
- code application »
- window algorithm »
- java application »
- application ant »
- ant algorithm »
-
1
Ant colony optimization algorithm for load balancing in grid computing
Published 2012Get full text
Get full text
Get full text
Monograph -
2
-
3
-
4
Chain code algorithm in deriving T-Junction and region of a freehand sketch
Published 2004“…The algorithm is based on 8-connected 3x3 windows of Freeman chain code. …”
Get full text
Get full text
Get full text
Article -
5
Line clipping based on parallelism approach and midpoint intersection
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
6
PCB defect detection system using run-length encoding
Published 2017Get full text
Get full text
Student Project -
7
-
8
The enhancement of mammographic images of breast cancer using median filtering (software development ) / Noor Saedah Selamat
Published 1996“…These algorithm are written in C code using BORLAND C++ in Windows environment , improvise the poor image to become a clear image using enhancement techniques. …”
Get full text
Get full text
Thesis -
9
-
10
Filling and restoration of cracked digitized paintings based on preserved neighbourhood pixels
Published 2021“…This paper investigates the applicability of a proposed digital image algorithm for filling cracks in digitized paintings. …”
Get full text
Get full text
Get full text
Article -
11
FPGA Implementation of Emergency Door Car Entry System
Published 2008“…FPGA board is a board that can be programmed using source code to run the application that has been downloaded into it. …”
Get full text
Learning Object -
12
A new domain decomposition FDTD technique for simulating electromagnetic penetration into buildings
Published 2005Get full text
Get full text
Get full text
Proceeding Paper -
13
-
14
On-chip communication system modeling approach for reability analysis focusing on functional failures
Published 2012“…The algorithms were verified and the resultsshow that minimum accuracy of 96% is maintained by applying the proposed crosstalk modeling approach while the number of required simulations is reduced by at least factor of 59% for modeling window sizes bigger than 3. …”
Get full text
Get full text
Thesis -
15
-
16
-
17
-
18
-
19
A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate
Published 2019“…To conform to the application requirements of the IoT, the new algorithm improves w-NAF, where w=4. …”
Get full text
Get full text
Thesis
