Search Results - (( java _ ((extraction algorithm) OR (function algorithm)) ) OR ( basic computing tree algorithm ))
Search alternatives:
- extraction algorithm »
- function algorithm »
- basic computing »
- computing tree »
- tree algorithm »
-
1
-
2
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
-
4
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
Get full text
Get full text
Get full text
Article -
5
BMTutor research design: Malay sentence parse tree visualization
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Stereo matching algorithm using census transform and segment tree for depth estimation
Published 2023“…Fundamentally, the framework input is the stereo image which represents left and right images respectively. The proposed algorithm in this article has four steps in total, which starts with the matching cost computation using census transform, cost aggregation utilizes segment-tree, optimization using winner-takes-all (WTA) strategy, and post-processing stage uses weighted median filter. …”
Get full text
Get full text
Get full text
Article -
7
Zero skew clock routing for fast clock tree generation
Published 2008Get full text
Get full text
Get full text
Proceeding Paper -
8
Challenges of hidden data in the unused area two within executable files
Published 2009“…Approach: The system designed to accommodate the release mechanism that consists of two functions; first is the hiding of the information in the unused area 2 of PE-file (exe.file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information). …”
Get full text
Get full text
Get full text
Article -
9
Petri Net Algorithm for controlling and monitoring system
Published 2009Get full text
Working Paper -
10
-
11
Image Based Oil Palm Tree Crowns Detection
Published 2020Get full text
Get full text
Final Year Project Report / IMRAD -
12
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
13
Tree physiology optimization on SISO and MIMO PID control tuning
Published 2018“…© 2018 The Natural Computing Applications Forum…”
Get full text
Get full text
Article -
14
Tree physiology optimization on SISO and MIMO PID control tuning
Published 2018“…© 2018 The Natural Computing Applications Forum…”
Get full text
Get full text
Article -
15
Detection and extraction features for signatures images via different techniques
Published 2019Get full text
Get full text
Conference or Workshop Item -
16
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…The prototypes will be developed using JAVA language united with a MySQL database. Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
Get full text
Get full text
Final Year Project -
17
Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks
Published 2015“…To generate, update and distribute the keys for secure communication over IEEE 802.16e, the MBS applies Multicast and Broadcast Rekeying Algorithm (MBRA) as a basic key management algorithm. …”
Get full text
Get full text
Thesis -
18
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
A proposed algorithm of random vector in measuring similarity for network topology of Bursa Malaysia
Published 2018“…Hence, to ease the calculation process and improve the computational efficiency of RV coefficient, an algorithm is proposed. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers
