Search Results - (( code application window algorithm ) OR ( java application drops algorithm ))
Search alternatives:
- application window »
- application drops »
- code application »
- window algorithm »
- java application »
-
1
Chain code algorithm in deriving T-Junction and region of a freehand sketch
Published 2004“…The algorithm is based on 8-connected 3x3 windows of Freeman chain code. …”
Get full text
Get full text
Get full text
Article -
2
Line clipping based on parallelism approach and midpoint intersection
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
3
PCB defect detection system using run-length encoding
Published 2017Get full text
Get full text
Student Project -
4
-
5
The enhancement of mammographic images of breast cancer using median filtering (software development ) / Noor Saedah Selamat
Published 1996“…These algorithm are written in C code using BORLAND C++ in Windows environment , improvise the poor image to become a clear image using enhancement techniques. …”
Get full text
Get full text
Thesis -
6
-
7
Filling and restoration of cracked digitized paintings based on preserved neighbourhood pixels
Published 2021“…This paper investigates the applicability of a proposed digital image algorithm for filling cracks in digitized paintings. …”
Get full text
Get full text
Get full text
Article -
8
FPGA Implementation of Emergency Door Car Entry System
Published 2008“…FPGA board is a board that can be programmed using source code to run the application that has been downloaded into it. …”
Get full text
Learning Object -
9
A new domain decomposition FDTD technique for simulating electromagnetic penetration into buildings
Published 2005Get full text
Get full text
Get full text
Proceeding Paper -
10
-
11
On-chip communication system modeling approach for reability analysis focusing on functional failures
Published 2012“…The algorithms were verified and the resultsshow that minimum accuracy of 96% is maintained by applying the proposed crosstalk modeling approach while the number of required simulations is reduced by at least factor of 59% for modeling window sizes bigger than 3. …”
Get full text
Get full text
Thesis -
12
-
13
-
14
-
15
-
16
A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate
Published 2019“…To conform to the application requirements of the IoT, the new algorithm improves w-NAF, where w=4. …”
Get full text
Get full text
Thesis
