Search Results - (( developing code using algorithm ) OR ( based applications using algorithmic ))
Search alternatives:
- based applications »
- applications using »
- developing code »
- using algorithm »
- code using »
- algorithmic »
-
1
Aplikasi rangkaian neural dalam pengesanan simpang bagi penterjemah lakaran pintar
Published 2006“…Back propagation neural network algorithm was used to develop and produce the classifier for corner detector algorithm. …”
Get full text
Get full text
Thesis -
2
-
3
Development of high quality speech compression system for Quranic recitation based on modified CELP algorithm
Published 2013“…Lastly, we evaluate the performance of the developed algorithm objectively using PESQ (Perceptual Evaluation of Speech Quality). …”
Get full text
Get full text
Get full text
Proceeding Paper -
4
Learning Algorithm effect on Multilayer Feed Forward Artificial Neural Network performance in image coding
Published 2007“…The obtained results show that the Quasi-Newton based algorithm has better performance as compared to the other two algorithms.…”
Get full text
Get full text
Get full text
Article -
5
Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code
Published 2022“…The proposed fuzzy encoder algorithm used dynamic membership functions, which were built according to the size of the file. …”
Get full text
Get full text
Thesis -
6
Steganography algorithm to hide secret message inside an image
Published 2011“…The proposed algorithm uses binary codes and pixels inside an image. …”
Get full text
Get full text
Article -
7
Development of a scalable video compression algorithm
Published 2012“…The result shows that the managed complexity algorithm based on Lagrangian Multiplier function outperforms the normal encoder. …”
Get full text
Get full text
Get full text
Proceeding Paper -
8
WAVELET-DCT BASED IMAGE CODER FOR VIDEO CODING APPLICATIONS
Published 2007“…This project is about the implementation ofWavelet-DCT intra-frame coder for video coding applications. Wavelet-DCT is a novel algorithm that uses Forward Discrete Wavelet Transform (DWT) to compute DCT. …”
Get full text
Get full text
Final Year Project -
9
Single Frame Profilometry With Rapid Phase Demodulation On Colour-Coded Fringes
Published 2019“…Three experiments were carried out to: (i) verify the applicability of the algorithms used in the proposed single-frame profilometry system; (ii) verify the applicability of the proposed phase error compensation algorithm; and (iii) compare the result of the proposed profilometry against the Mitutoyo CRYSTA-Plus M Series 196 coordinate-measuring machine (CMM). …”
Get full text
Get full text
Thesis -
10
Automated data process in participatory sensing using QR-code and EAN-13 barcode
Published 2018“…The enhanced algorithm was evaluated using a developed prototype which is an Android mobile application of a crowdsourcing data submission based on product price and information, WE+Price, in which, the algorithm was embedded. …”
Get full text
Get full text
Thesis -
11
Reusability techniques in load-flow analysis computer program
Published 2004“…The software is built by using component-based development and object oriented programming methodologies. …”
Get full text
Get full text
Article -
12
The evolution and trend of chain code scheme
Published 2008“…This paper explains some chain code concepts and their applications that are be the background of the development of vertex chain code cells algorithm. …”
Get full text
Get full text
Get full text
Article -
13
Parallelization of speech compression based algorithm based on human auditory system on multicore system
Published 2012“…Matlab parallel computing toolbox was used in the implementation. Finally, the performance of the developed parallel algorithm was evaluated using Perceptual Evaluation of Speech Quality (PESQ) and parallel execution time. …”
Get full text
Get full text
Get full text
Article -
14
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
15
-
16
Performance of MIMO space-time coded system and training based channel estimation for MIMO-OFDM system
Published 2006“…Secondly, it has focused on training based channel estimation algorithm for MIMO-OFDM system. …”
Get full text
Get full text
Thesis -
17
Content adaptive fast motion estimation based on spatio-temporal homogeneity analysis and motion classification
Published 2012“…In video coding, research is focused on the development of fast motion estimation (ME) algorithms while keeping the coding distortion as small as possible. …”
Get full text
Get full text
Get full text
Article -
18
Active intelligent control of vibration of flexible plate structures
Published 2011“…However, the non-model based AVC algorithms are faster than their model-based AVC counterparts.…”
Get full text
Get full text
Thesis -
19
Development of a cost efficient vision system for defects detection / Muhammad Zarif Kamarudin
Published 2010“…This need to be done due to the fact that further improvement of this project will need the coding history on how the algorithm being developed thus documentation is the common practice in programming stage. …”
Get full text
Get full text
Monograph -
20
A hybrid database encryption algorithm based on reverse string and dynamic key
Published 2016“…Personal computers has become one of the important part of human life, especially when they using the Internet or any public networks.So, the information or data may still be deliberately or inadvertently leaked out by the insiders or customers.In this paper, we proposing new algorithm to protect any type of data, depending on the substitution techniques, using dynamic key (DK) and reveres string for each character in the text (or field in the file of the database) and each string .A special equation was developed to generate the DK, it’s depend on the length of string, order the character in the string,ASCII code of the character, and string sequence.The proposed algorithm using the reverse string before encryption, also, there are two actions after that, for the purpose of increasing the complexity of the algorithm.The results showed that The developed algorithm was successes to remove any duplicate encryption, for each character and each record even when the text duplicated.…”
Get full text
Get full text
Conference or Workshop Item
