Search Results - (( integer _ detection algorithm ) OR ( java application customization algorithm ))
Search alternatives:
-
1
-
2
Development of symbolic algorithms for certain algebraic processes
Published 2007“…The modular technique is employed to minimize the complexity involved in such computations. A divisor test algorithm that enables the detection of an unlucky reduction is a crucial device for an effective implementation of the modular technique. …”
Get full text
Get full text
Get full text
Monograph -
3
Development of symbolic algorithms for certain algebraic processes
Published 2007“…The modular technique is employed to minimize the complexity involved in such computations. A divisor test algorithm that enables the detection of an unlucky reduction is a crucial device for an effective implementation of the modular technique. …”
Get full text
Get full text
Get full text
Monograph -
4
Dual-purpose semi-fragile watermark: Authentication and recovery of digital images
Published 2013“…The proposed technique exhibits the flexibility between imperceptibility, robustness, and capacity. In addition, integer wavelet transform has been used to reduce the computational complexity of the algorithm. …”
Get full text
Get full text
Get full text
Citation Index Journal -
5
Dual-purpose semi-fragile watermark: Authentication and recovery of digital images
Published 2013“…The proposed technique exhibits the flexibility between imperceptibility, robustness, and capacity. In: addition, in:teger wavelet transform has been used to reduce the computational complexity of the algorithm. …”
Get full text
Get full text
Article -
6
A fuzzy multi-objective optimisation model of risk-based gas detector placement methodology for explosion protection in oil and gas facilities
Published 2022“…A flammable gas detection system is one of the critical control strategies of catastrophic events such as fire and explosion. …”
Get full text
Get full text
Article -
7
-
8
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
9
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…The existing infeasible path detection methods are restricted to extended finite state machine (EFSM) models with integer data type only. …”
Get full text
Get full text
Get full text
Thesis -
10
-
11
-
12
-
13
-
14
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
A reliable time base routing framework with seamless networking operation for SDN / Nauman Khan
Published 2024“…It is framed as a mixed-integer linear programming problem. To address this complexity, this work presents a multi-objective heuristic algorithm in the framework with the help of other module inputs that efficiently determines the best path for upcoming affected flows and timely isolates the maintenance switch except for the critical switch. …”
Get full text
Get full text
Get full text
Thesis -
16
Identification of debris flow initiation zones using topographic model and airborne laser scanning data
Published 2017“…Debris flows and no-debris flows were categorized, and the transform to continuous integer (1 and 0), respectively. To achieve this, the data set was divided into two, 70% (840) for the training dataset and 30% (360) for validation. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
