Search Results - (( filing implementation case algorithm ) OR ( java implication force algorithm ))
Search alternatives:
- filing implementation »
- implementation case »
- implication force »
- java implication »
- force algorithm »
- case algorithm »
-
1
-
2
Implementing BiSM and CCL algorithm for managing audio storage
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Prototype development for embedding large amount of information using secure LSB and neural based steganography
Published 2009“…The need for new methods, techniques and algorithms to make enhancements regarding increasing the amount the hidden information, preserving the host file quality, preserving the size of the file, and keep it robust against steganalysis. …”
Get full text
Get full text
Thesis -
4
Test Cases Minimization Strategy Based On Flower Pollination Algorithm
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Experimental implementation controlled SPWM inverter based harmony search algorithm
Published 2017“…The proposed overall inverter design and the control algorithm are modelled using MATLAB environment (Simulink/m-file Code). …”
Get full text
Get full text
Get full text
Article -
6
Stray animal complaint system using geolocation technique with rule-based Algorithm / Albin Lemuel Kushan … [et al.]
Published 2021“…Therefore, this project intended to provide a better platform for local neighbourhood to file their complaint and the local council to address the filed complaint. …”
Get full text
Get full text
Get full text
Book Section -
7
Reassembly and clustering bifragmented intertwined jpeg images using genetic algorithm and extreme learning machine
Published 2019“…Today, JPEG image files are popular file formats that have less structured contents which make its carving possible in the absence of any file system metadata. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Among all of the cryptography measures, Secure Hash Algorithm 3 (SHA-3) is the newest and secure cryptographic hash algorithm in the current electronic industry. …”
Get full text
Get full text
Thesis -
9
Experimental implementation controlled SPWM inverter based harmony search algorithm
Published 2023Article -
10
A network based fetal ECG monitoring algorithm
Published 2011“…Proposed system is used to study numbers of cases and satisfactory result is found compared with conventional systems.…”
Get full text
Get full text
Get full text
Article -
11
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
12
-
13
Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji
Published 2018“…Thus the main objective of this study is to implement an automatic algorithm to previous algorithm to make it fully automatic system. …”
Get full text
Get full text
Thesis -
14
-
15
Workload performance evaluation of large spatial database for DSS based disaster management
Published 2017“…Then, all the workload that are obtained to determine the processes are recorded into one excel file. The Case Based Reasoning (CBR) optimized with Hash Search Technique has been adopted in this study for the purpose of evaluating and predicting the workload performance of PostgreSQL DBMS. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…Another different case of cybersecurity is the Distributed Denial of Services (DDoS) attack. …”
Get full text
Get full text
Thesis
