Search Results - (( code location based algorithm ) OR ( java application _ algorithm ))
Search alternatives:
- java application »
- code location »
-
1
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
Optimization of the Jakim halal logo placement on qr code using enhanced genetic algorithm
Published 2018“…The thesis proposed a method to place a logo on top of the QR code, embedded with high data capacity, using Genetic Algorithm (GA) search technique to find appropriate size and location so the QR code can be decoded by various QR code decoders. …”
Get full text
Get full text
Get full text
Thesis -
3
A new corner detection algorithm for chain code representation.
Published 2005“…The algorithm is based on chain-coded image, deriving the slope between each code, analyze the series of chain code, and finally decide the existence of corner at the current pixel location. …”
Get full text
Get full text
Article -
4
Chain code algorithm in deriving T-Junction and region of a freehand sketch
Published 2004“…The algorithm is based on 8-connected 3x3 windows of Freeman chain code. …”
Get full text
Get full text
Get full text
Article -
5
Automated data process in participatory sensing using QR-code and EAN-13 barcode
Published 2018“…The enhanced algorithm was evaluated using a developed prototype which is an Android mobile application of a crowdsourcing data submission based on product price and information, WE+Price, in which, the algorithm was embedded. …”
Get full text
Get full text
Thesis -
6
Design of information hiding algorithm for multi-link network transmission channel
Published 2019“…Traditional channel information hiding algorithms based on m-sequence for multi-link network transmission, which apply m-sequence to channel coding information hiding system, do not analyze the upper limit of hiding capacity of multi-link network transmission channel system, and do not consider the hidden danger of overlapping secret information when embedding secret information is too large. …”
Get full text
Get full text
Get full text
Article -
7
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
8
-
9
-
10
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
11
Transform domain slice based distributed video coding
Published 2011Get full text
Get full text
Citation Index Journal -
12
-
13
An Adaptive Error Correction Scheme For Synchronous Digital Hierarchy-Based Wavelength Division Multiplexed Optical Network
Published 2007“…A new technique is also proposed for estimation of the error pattern so that a suitable type of code can be assigned accordingly. This technique is based on the analysis of the corrected error locations, referred to as the error location analysis (ELA). …”
Get full text
Get full text
Thesis -
14
Space allocation for examination scheduling using Genetic Algorithm / Alya Kauthar Azman
Published 2025“…The research adopts a Genetic Algorithm-based approach, where examination scheduling details such as date, time, course code, program code, student group, student numbers, and available spaces are encoded as chromosomes. …”
Get full text
Get full text
Thesis -
15
Framework for location based attendance system by using fourth industrial revolution (4ir) technologies
Published 2021“…The designed framework used triple authentication i.e. biometric authentication, QR-code authentication, and location based authentication that reduced the risk of prone attendance.…”
Get full text
Get full text
Get full text
Article -
16
-
17
Optimization in active vibration control: virtual experimentation using COMSOL multiphysics - MATLAB integration
Published 2014“…Ant colony optimization algorithm is employed for this purpose. Instead of using equation-based modeling for the system, the plant is a finite element model developed in COMSOL Multiphysics software, which later interfaced with the MATLAB-coded optimization algorithm using the Livelink for MATLAB feature. …”
Get full text
Get full text
Get full text
Proceeding Paper -
18
Scheduling scientific workflow using multiobjective algorithm with fuzzy resource utilization in multi-cloud environment
Published 2020“…The coding scheme jointly considers task execution location and data transportation order. …”
Get full text
Get full text
Article -
19
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Crossover and mutation operators of real coded genetic algorithms for global optimization problems
Published 2016“…On another note, the drawback in CS is in locating the most stable conformation of a molecule with the minimum potential energy based on a mathematical function. …”
Get full text
Get full text
Thesis
