Search Results - (( java application model algorithm ) OR ( software identification method algorithm ))
Search alternatives:
- software identification »
- identification method »
- application model »
- java application »
- method algorithm »
- model algorithm »
-
1
-
2
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
3
Register Transfer Level Implementation Of Pooling - Based Feature Extraction For Finger Vein Identification
Published 2017“…Many improvements methods were utilized to increase the speed and accuracy of the identification. …”
Get full text
Get full text
Thesis -
4
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
5
Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali
Published 2022“…The system algorithm is verified and validates on two sloped bumps surface topographies that have been simulated using MATLAB software and measured using the Alicona Infinite Focus Measurement (IFM) device, respectively. …”
Get full text
Get full text
Thesis -
6
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
-
8
Three phase fault algorithm in distribution system by using database approach and impedance based method
Published 2012“…The configuration of 132/11kV from actual distribution system in Malaysia with 38 nodes is modelled using the PSCAD/EMTDC software. This work attempt to combine fault section identification with impedance based method in order to address non-homogeneity of cables in distribution system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
10
Topic identification method for textual document
Published 2017Get full text
Get full text
Get full text
Article -
11
Discrete-Time System Identification Based On Novel Information Criterion Using Genetic Algorithm
Published 2017“…Parameter magnitude-based information criterion 2 (PMIC2), as a novel information criterion, is used alongside Akaike information criterion (AIC). Genetic algorithm (GA) as a popular search method, is used for selecting a model structure. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Comparison Of Crossover In Genetic Algorithm For Discrete-Time System Identification
Published 2021“…This paper investigates the effect of different types of crossover, namely, single-point, double-point, multiple-point and uniform crossover, within GA in producing an optimum model structure for system identification. This was carried out using a computational software on a number of simulated data. …”
Get full text
Get full text
Get full text
Article -
13
-
14
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
Get full text
Get full text
Final Year Project -
15
-
16
SYSTEM IDENTIFICATION AND MODEL PREDICTIVE CONTROL FOR INTERACTING SERIES PROCESS WITH NONLINEAR DYNAMICS
Published 2009“…The subspace system identification method is used to estimate the linear model parameters. …”
Get full text
Get full text
Thesis -
17
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
Get full text
Get full text
Final Year Project -
18
Secure Image Steganography Using Encryption Algorithm
Published 2016“…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
Get full text
Get full text
Conference or Workshop Item -
19
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
Get full text
Get full text
Get full text
Thesis -
20
An automated multimodal white matter hyperintensities identification in MRI brain images using image processing / Iza Sazanita Isa
Published 2018“…In parallel, the automated performance and manual delineation for WMH identification is validated to determine the degree of similarity between both the methods. …”
Get full text
Get full text
Book Section
