Search Results - (( developing embedding proposed algorithm ) OR ( java implementation using algorithm ))
Search alternatives:
- developing embedding »
- implementation using »
- java implementation »
- embedding proposed »
- proposed algorithm »
- using algorithm »
-
1
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
3
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
4
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
5
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
6
Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications
Published 2025“…In recent studies, we seen developers and researchers proposing solutions on deep learning algorithms like YOLO, EfficientNet, CNN, MobileNet etc. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
8
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
9
A novel steganography algorithm using edge detection and MPC algorithm
Published 2019“…To diminish the imposed distortion by data embedding in edge blocks, we employ LSB and MPC algorithms. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
11
Enhanced Steganography Framework Based On Lossless Compression And Histogram
Published 2024“…The Embedding Map Generation Model proposed two techniques to determine the best RGB channels and generate the embedding location map before the embedding process. …”
Get full text
Get full text
Thesis -
12
Shape-based Road Sign Detection and Recognition for Embedded Application Using MATLAB
Published 2010“…In this paper, we propose a road sign detection and recognition algorithm for an embedded application. …”
Get full text
Get full text
Conference or Workshop Item -
13
Road Sign Detection and Recognition System for Real-Time Embedded Applications
Published 2011“…In this paper, we propose a road sign detection and recognition algorithm for an embedded application, which requires computationally simple but accurate algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Implementation Of Hardware Software Partitioning In Embedded System
Published 2018“…Both of the algorithms are achieve the same best cost which is 169.6022 and the optimum solution proposed by both algorithms are nine tasks should be run in hardware and six tasks should be run in software. …”
Get full text
Get full text
Monograph -
15
Multi-state PSO GSA for solving discrete combinatorial optimization problems
Published 2016“…As a consequence, multi-state particle swarm optimization with an embedded rule (MSPSOER) and multi-state gravitational search algorithm with an embedded rule (MSGSAER) are developed. …”
Get full text
Get full text
Thesis -
16
Embedded Meta evolutionary-firefly algorithm-ANN for multi dg planning in distribution system / Siti Rafidah Abdul Rahim
Published 2019“…This thesis presents a novel Embedded Meta Evolutionary–Firefly Algorithm-Artificial Neural Network for Multi-DG planning in distribution system. …”
Get full text
Get full text
Thesis -
17
Real-time implementation of H∞ controller for UAV helicopter using MATLAB-based embedded programming approach
Published 2015“…The rapid-prototyping and deployment of flight control algorithm on a real-time embedded target has been one of the major challenges in an unmanned helicopter system development. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
Café Web Based System Using Priority Scheduling Approach
Published 2017“…The system is implemented at UniSZA’s café where two different types of user will use the system. …”
Get full text
Get full text
Conference or Workshop Item -
19
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
Get full text
Get full text
Final Year Project -
20
Crypto Embedded System for Electronic Document
Published 2006“…The 32-bit soft cores of AlteraÂ’s Nios RISC processor is used as the basic building blocks of the proposed complete embedded solutions. AlteraÂ’s SOPC Builder is used to facilitate the development of crypto embedded system, particularly in hardware/software integration stage. …”
Get full text
Get full text
Article
