Search Results - (( java a computational algorithm ) OR ( basic computing tree algorithm ))
Search alternatives:
- a computational »
- basic computing »
- computing tree »
- tree algorithm »
- java a »
-
1
-
2
-
3
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
4
-
5
BMTutor research design: Malay sentence parse tree visualization
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Stereo matching algorithm using census transform and segment tree for depth estimation
Published 2023“…Fundamentally, the framework input is the stereo image which represents left and right images respectively. The proposed algorithm in this article has four steps in total, which starts with the matching cost computation using census transform, cost aggregation utilizes segment-tree, optimization using winner-takes-all (WTA) strategy, and post-processing stage uses weighted median filter. …”
Get full text
Get full text
Get full text
Article -
7
Zero skew clock routing for fast clock tree generation
Published 2008Get full text
Get full text
Get full text
Proceeding Paper -
8
Café Web Based System Using Priority Scheduling Approach
Published 2017Get full text
Get full text
Conference or Workshop Item -
9
Improving resource management with multi-instance broker scheduling algorithm in hierarchical grid computing
Published 2016“…The main purpose of this research is to propose a design of scheduling algorithm for hierarchical grid computing. …”
Get full text
Get full text
Get full text
Thesis -
10
Petri Net Algorithm for controlling and monitoring system
Published 2009Get full text
Working Paper -
11
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
Get full text
Get full text
Get full text
Book -
12
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…The two most famous techniques for data security are steganography and cryptography. Utilization of a solitary algorithm is not powerful for extra ordinary state security to information in cloud computing. …”
Get full text
Get full text
Get full text
Thesis -
13
-
14
Image Based Oil Palm Tree Crowns Detection
Published 2020Get full text
Get full text
Final Year Project Report / IMRAD -
15
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
16
Tree physiology optimization on SISO and MIMO PID control tuning
Published 2018“…© 2018 The Natural Computing Applications Forum…”
Get full text
Get full text
Article -
17
Tree physiology optimization on SISO and MIMO PID control tuning
Published 2018“…© 2018 The Natural Computing Applications Forum…”
Get full text
Get full text
Article -
18
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…The optimization of a computationally intensive algorithm such as this on a mobile platform is challenging due to the limited resources available. …”
Get full text
Get full text
Conference or Workshop Item -
19
Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT
Published 2006“…The computer lab timetabling problem at Unit ICT, Fakulti Teknologi Maklumat, Universiti Utara Malaysia is introduced and the prototype has been developed using Java language. …”
Get full text
Get full text
Thesis -
20
An Effective Fast Searching Algorithm for Internet Crawling Usage
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item
