Search Results - (( data processing force algorithm ) OR ( java application model algorithm ))
Search alternatives:
- application model »
- processing force »
- java application »
- force algorithm »
- model algorithm »
-
1
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
2
-
3
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
4
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
5
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Establishment of spectral subtraction-based algorithm for experimental modal analysis under operating condition
Published 2022“…Therefore, output response from the measurement requires a filtering process to suppress the response from operating forces and retain only the response from the artificially induced force. …”
Get full text
Get full text
Thesis -
7
Improved criteria determination of an automated negative lightning return strokes characterisation using Brute-Force search algorithm
Published 2021“…Nevertheless, this traditional method could compromise data analysis accuracy due to human errors. The processing time to analyse the data would also be longer, especially for larger sample sizes. …”
Get full text
Get full text
Thesis -
8
HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION
Published 2011“…In the query process, accuracy is determined by the number of feature vector elements, data extraction, and similarity measurement algorithm. …”
Get full text
Get full text
Thesis -
9
Automated negative lightning return strokes characterization using brute-force search algorithm
Published 2022“…Nevertheless, this method could compromise the accuracy of data analysis due to human error. Moreover, a longer processing time would be required to analyze data, especially for larger sample sizes. …”
Get full text
Get full text
Get full text
Article -
10
Automated negative lightning return strokes characterization using brute-force search algorithm
Published 2022“…Nevertheless, this method could compromise the accuracy of data analysis due to human error. Moreover, a longer processing time would be required to analyze data, especially for larger sample sizes. …”
Get full text
Get full text
Get full text
Article -
11
Automated Negative Lightning Return Strokes Characterization Using Brute-Force Search Algorithm
Published 2024Get full text
journal::journal article -
12
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
13
Natural gas liquid (NGL) distillation process using driving force and thermal pinch analysis methods: Energy and economic assessment / Munawar Zaman Shahruddin ... [et al.]
Published 2020“…Then, the extracted data from the simulation will be used for thermal pinch analysis via problem table algorithm (PTA). …”
Get full text
Get full text
Article -
14
-
15
-
16
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
Get full text
Get full text
Final Year Project -
17
Secure Image Steganography Using Encryption Algorithm
Published 2016“…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
Get full text
Get full text
Conference or Workshop Item -
18
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
Get full text
Get full text
Get full text
Thesis -
19
-
20
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Subjects:Conference paper
