Search Results - (( developing coding window algorithm ) OR ( java application model algorithm ))
Search alternatives:
- developing coding »
- application model »
- window algorithm »
- java application »
- model algorithm »
- coding window »
-
1
-
2
-
3
PCB defect detection system using run-length encoding
Published 2017“…Both of the PCB test and PCB original images was created an analysis window. Each of the analysis windows contents the RLE code. …”
Get full text
Get full text
Student Project -
4
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
5
The enhancement of mammographic images of breast cancer using median filtering (software development ) / Noor Saedah Selamat
Published 1996“…These algorithm are written in C code using BORLAND C++ in Windows environment , improvise the poor image to become a clear image using enhancement techniques. …”
Get full text
Get full text
Thesis -
6
-
7
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
8
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
-
10
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
11
-
12
-
13
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
Get full text
Get full text
Final Year Project -
14
Secure Image Steganography Using Encryption Algorithm
Published 2016“…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
Get full text
Get full text
Conference or Workshop Item -
15
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
Get full text
Get full text
Get full text
Thesis -
16
Agent-based extraction algorithm for computational problem solving
Published 2015“…Additionally, IPO_Agent not only produces the same PAC’s output results, but also generates module number and represents these results in another window. Finally,Algorithm_Agent employs the extracted information provided by IPO_Agent to produce the pseudo-code of the given problem and shows it in separate window. …”
Get full text
Get full text
Thesis -
17
A new domain decomposition FDTD technique for simulating electromagnetic penetration into buildings
Published 2005“…The hybrid technique enables us to efficiently handle wire type configurations using a MoM type of code, while we use the proposed domain decomposition FDTD method to analyze inhomogeneous structures, such as buildings with doors, windows and electronic. …”
Get full text
Get full text
Get full text
Proceeding Paper -
18
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Subjects:Conference paper -
19
Network game (Literati) / Chung Mei Kuen
Published 2003“…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
Get full text
Get full text
Thesis -
20
Pseudo Randomized Search Strategy (PRSS*) of the ambiguity function mapping
Published 1998“…This result shows that the size of the search window does not play an important role in determining the efficiency of the search and therefore suitable for the on-the fly ambiguity resolution of a single frequen9Y CIA code receiver.…”
Get full text
Get full text
Article
