Search Results - (( developing digitalization search algorithm ) OR ( java application using algorithm ))
Search alternatives:
- developing digitalization »
- digitalization search »
- java application »
- using algorithm »
-
1
-
2
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
3
Mobile cookbook application with searching by ingredients / Falihah Mamat @ Mohammad
Published 2015“…The searching techniques that will be used is sequential search algorithm for searching recipe by name and for searching by ingredients, the set algorithm will be used which is intersection algorithm to solved the problem. …”
Get full text
Get full text
Thesis -
4
-
5
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
6
The Development of Color Based Visual Search Utility
Published 2001“…Finally, a binary search algorithm was used to match and display images requested. …”
Get full text
Get full text
Thesis -
7
Hybridflood algorithms minimizing redundant messages and maximizing efficiency of search in unstructured P2P networks
Published 2012“…We proposed two novel search algorithms named QuickFlood and HybridFlood. …”
Get full text
Get full text
Thesis -
8
Multi-state PSO GSA for solving discrete combinatorial optimization problems
Published 2016“…As a consequence, multi-state particle swarm optimization with an embedded rule (MSPSOER) and multi-state gravitational search algorithm with an embedded rule (MSGSAER) are developed. …”
Get full text
Get full text
Thesis -
9
Binary search algorithm-based maximum power point tracking for photovoltaic system under partial shaded conditions
Published 2018“…This paper presents the study on the application of Binary Search Algorithm (BSA) to determine the maximum power point under partially shaded photovoltaic system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi
Published 2015“…Due to the fast development of powerful image processing tools and the importance of image integrity, digital image forgery has become a very important topic for certain organizations. …”
Get full text
Get full text
Thesis -
11
Optimization of Digital Electronic Circuit Structure Design Using Genetic Algorithm
Published 2008“…Karnaugh map can provide the simple minimization process for Boolean expression, but it encounters difficulties when the variable is more than four In this research, Genetic Algorithm (GA) technique is used as a tool to search for the optimal solution for the digital circuit structure. …”
Get full text
Get full text
Thesis -
12
-
13
-
14
Differential Search Optimized Random Forest Regression Algorithm for State of Charge Estimation in Electric Vehicle Batteries
Published 2023Conference Paper -
15
Isolated digit speech recognition in Malay language using Neuro-Fuzzy approach
Published 2009Get full text
Get full text
Conference or Workshop Item -
16
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
18
Development of unconstrained handwritten digit extraction, segmentation and recognition on bank cheques using artificial neural network
Published 2005“…And lastly, to develop an Artificial Neural Network for digit recognition. …”
Get full text
Student Project -
19
Review of wavelet theory and its application to image data compression
Published 2003“…The fast development of computing multimedia has led to the demand of using digital images. …”
Get full text
Get full text
Get full text
Article -
20
Improving collection of data type evidence and the integrity of evidence collected using SHA-256 hashing algorithm for web browsers
Published 2024“…This study introduces a method to enhance web browser evidence collection in digital forensic investigations. The focus of this study specifically operating 3 evidence collection software forensic toolkits in one developed forensic toolkit called ForenWebSight (FWS). …”
Get full text
Get full text
Get full text
Article
