Search Results - (( developing intensive method algorithm ) OR ( java application model algorithm ))
Search alternatives:
- developing intensive »
- application model »
- intensive method »
- method algorithm »
- java application »
- model algorithm »
-
1
-
2
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
3
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
4
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Machine Vision Application For Automatic Defect Segmentation In Weld Radiographs
Published 2006“…Finally. a defect segmentation algorithm was developed to segment the defects automatically from the image using background subtraction and rank leveling method.…”
Get full text
Get full text
Thesis -
6
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
7
-
8
-
9
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006“…This project is completed phase by phase and for the system development, the method used is evolutionary development approach. …”
Get full text
Get full text
Final Year Project -
10
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
Get full text
Get full text
Final Year Project -
11
Secure Image Steganography Using Encryption Algorithm
Published 2016“…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
Get full text
Get full text
Conference or Workshop Item -
12
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
Get full text
Get full text
Get full text
Thesis -
13
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Subjects:Conference paper -
14
Artificial neural network model for predicting windstorm intensity and the potential damages / Mohd Fatruz Bachok
Published 2019“…For the establishment of back-propagation algorithms, it does not only use Artificial Neural Network (ANN) model but also other techniques such as multiple regression analysis, dichotomous forecast method and error difference method. …”
Get full text
Get full text
Thesis -
15
Network game (Literati) / Chung Mei Kuen
Published 2003“…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
Get full text
Get full text
Thesis -
16
The development of semantic meta-database: an ontology based semantic integration of biological databases
Published 2007“…The tool comprises two intelligent algorithms. The first algorithm combines parallel genetic algorithm with the split-and-merge algorithm. …”
Get full text
Get full text
Monograph -
17
Automated time series forecasting
Published 2011Get full text
Get full text
Get full text
Monograph -
18
Jogging activity recognition using k-NN algorithm
Published 2022“…To recognize and classify the level of jogging intensity, k-Nearest Neighbours (k-NN) algorithms will be considered as a machine learning method. …”
Get full text
Get full text
Get full text
Academic Exercise -
19
Face expression recognition using artificial neural network (ANN) / Mazuraini Ghani
Published 2005“…In preprocessing phase, s detail studies and intensive experiments were conducted to obtain a suitable method of segmentation. …”
Get full text
Get full text
Thesis -
20
Numerical Integration And Data Reduction For Application In Photometry
Published 2003“…In this thesis, an algorithm based on a local interpolation scheme called the Average Angle Method was developed for numerical integration and data reduction of photometric data, and in general, for any data set sharing similar characteristics as the luminous intensity data The new interpolation scheme interpolates discrete data with piecewise cubic polynomials having a CI continuity in the interior. knots. …”
Get full text
Get full text
Thesis
