Search Results - (( code application window algorithm ) OR ( java application matching algorithm ))
Search alternatives:
- application matching »
- application window »
- code application »
- window algorithm »
- java application »
-
1
Chain code algorithm in deriving T-Junction and region of a freehand sketch
Published 2004“…The algorithm is based on 8-connected 3x3 windows of Freeman chain code. …”
Get full text
Get full text
Get full text
Article -
2
-
3
Line clipping based on parallelism approach and midpoint intersection
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
4
PCB defect detection system using run-length encoding
Published 2017Get full text
Get full text
Student Project -
5
-
6
The enhancement of mammographic images of breast cancer using median filtering (software development ) / Noor Saedah Selamat
Published 1996“…These algorithm are written in C code using BORLAND C++ in Windows environment , improvise the poor image to become a clear image using enhancement techniques. …”
Get full text
Get full text
Thesis -
7
-
8
-
9
-
10
Filling and restoration of cracked digitized paintings based on preserved neighbourhood pixels
Published 2021“…This paper investigates the applicability of a proposed digital image algorithm for filling cracks in digitized paintings. …”
Get full text
Get full text
Get full text
Article -
11
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
12
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
FPGA Implementation of Emergency Door Car Entry System
Published 2008“…FPGA board is a board that can be programmed using source code to run the application that has been downloaded into it. …”
Get full text
Learning Object -
14
A new domain decomposition FDTD technique for simulating electromagnetic penetration into buildings
Published 2005Get full text
Get full text
Get full text
Proceeding Paper -
15
-
16
On-chip communication system modeling approach for reability analysis focusing on functional failures
Published 2012“…The algorithms were verified and the resultsshow that minimum accuracy of 96% is maintained by applying the proposed crosstalk modeling approach while the number of required simulations is reduced by at least factor of 59% for modeling window sizes bigger than 3. …”
Get full text
Get full text
Thesis -
17
-
18
-
19
-
20
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis
