Search Results - (( java application matching algorithm ) OR ( system implementation based algorithm ))
Search alternatives:
- system implementation »
- application matching »
- implementation based »
- java application »
-
1
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…Hence, the objective of this research is to propose suitable and optimize algorithm for ANPR system on Android mobile phone. …”
Get full text
Get full text
Get full text
Book -
2
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. …”
Get full text
Get full text
Thesis -
3
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…KSFaci is embedded in web environment and is implemented using Java Servlet and runs under Apache server. …”
Get full text
Get full text
Thesis -
4
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. The purpose of this project is to implement FPGA Base Encryption Chip using DES algorithm. …”
Get full text
Get full text
Monograph -
5
-
6
FPGA Implementation of Multi-User Detection Genetic Algorithm Tool for SDMA-OFDM Systems
Published 2016“…Real-time based implementation of MUD systems has the potential to play a major role in next-generation communication systems.…”
Get full text
Get full text
Article -
7
Implementation of VLSI architecture in linear prediction algorithm: article / Mohd Saiful Mistor
Published 2013“…This project presents the implementation of VLSI architecture in linear prediction algorithm. …”
Get full text
Get full text
Article -
8
-
9
Enhancing Market-Based Scheduling Algorithm on Globally Distributed Web Servers Using Least Suitable Sealed Bid Technique
Published 2006“…Scheduling of a multiple distributed servers is considered as a complex problem.considered as NP-complete problem,where no single efficient algorithm guaranteed to produce optimal results.This thesis investigates on how to find optimal solution for distribute system,by implementing market based scheduling Algorithm(MBSA).On implementing the MBSA, a new auction technique which is the least suitable sealed bid auction will be introduced.it is found that least suitable sealed bid technique will give the close-to-optimum solution.In the implementation, cooperative agents were used as a middleware between web servers and stand-alone schedulers. …”
Get full text
Get full text
Thesis -
10
-
11
An FPGA implementation of exp-bet scheduling algorithm in LTE networks / Yusmardiah Yusuf
Published 2017“…It is performed by the scheduling algorithm implemented in the Long Term Evolution (LTE) base station, Evolved Node B. …”
Get full text
Get full text
Thesis -
12
-
13
Implementation of VLSI architecture in linear prediction algorithm / Mohd Saiful Mistor
Published 2013“…This project presents the implementation of VLSI architecture in linear prediction algorithm. …”
Get full text
Get full text
Student Project -
14
Evaluation Algorithm - Based on PID Controller Design for the Unstable Systems
Published 2015“…In this project, the evaluating PSO algorithm based on PID controller design for unstable system was proposed. …”
Get full text
Get full text
Get full text
Article -
15
CAR TRACTION CONTROL SYSTEM
Published 2007“…This project explores the potential of implementing fuzzy logic algorithm for traction control system using VHDL. …”
Get full text
Get full text
Final Year Project -
16
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
17
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
18
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Parallel distributed computational microcontroller system for adaptive antenna downlink transmitter power optimization
Published 2023“…This paper presents a tested research concept that implements a complex evolutionary algorithm, genetic algorithm (GA), in a multi-microcontroller environment. …”
Article -
20
Comparison for selection technique in genetic algorithm
Published 2006“…The purpose of this project is to make a comparison for three selection techniques in Genetic Algorithm.The Genetic Algorithm has been implemented in the previous module for Chess Tournament Management System.Base on previous system the selection method only using randomize.By this project module,only three selections method were use for the comparison.They are Roulette Wheel, Steady-State and Rank selection.The result for this comparison has determined the appropriate selection for Genetic Algorithm implementation in Chess Tournament Management System.This will help Chess Tournament Management System to provide a better optimize schedule.…”
Get full text
Get full text
Undergraduates Project Papers
