Search Results - (( java application testing algorithm ) OR ( point coding using algorithm ))

Refine Results
  1. 1

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…Recent industrial solutions to overcome the problem includes using manual registration, using 125kHz proximity card, using mobile application to scan QR code and others. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  3. 3
  4. 4

    Line clipping based on parallelism approach and midpoint intersection by Hattab, Adel Salem Abdullah, Yusof, Yuhanis

    Published 2014
    “…In this algorithm there are no area codes to determine the position of end points of line.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  6. 6

    Crow Search Freeman Chain Code (CS-FCC) feature extraction algorithm for handwritten character recognition by Muhammad Arif, Mohamad, Zalili, Musa, Amelia Ritahani, Ismail

    Published 2023
    “…The data representation method employed was Freeman Chain Code (FCC). The fundamental issue with using FCC to represent a character is that the outcomes of the extractions depend on the starting points that changed the chain code's route length. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection by Ahmed Khan, Fazeel, Abubakar, Adamu

    Published 2024
    “…The network traffic transmission is effectively managed and prioritized using Quality of Service (QoS). The Differential Services Code Point within the Differentiated Service (DiffServ) field is primarily used inside the Layer 3 encapsulated network IP packets. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Direct Block Methods for Solving Special Second Order Ordinary Differential Equations and Their Parallel Implementations by Yap, Lee Ken

    Published 2008
    “…The performances of the r-point block methods using sequential and parallel codes are compared in terms of the total steps, execution time, speedup and efficiency. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Development of new code for optical code division multiple access systems by Hilal Adnan, Fadhil

    Published 2011
    “…Splitting algorithm is proposed to construct the new code families namely RD code. …”
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Improving ocraccuracy for scanned historical newspapers by Naiker, Nithyananthan

    Published 2013
    “…In this project, one variant of the chain code algorithm known as Compare images algorithm is presented when it has been tuned to process some samples of Sarawak Gazette. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  13. 13

    Performance Analysis of Hexagon-Diamond Search Algorithm for Motion Estimation using MATLAB by Abdul Manap, Redzuan, Ranjit, S.S.S.

    Published 2010
    “…One of ME techniques, known as Block Matching Algorithm (BMA), has been widely used in various video coding standards. …”
    Get full text
    Get full text
    Article
  14. 14

    Power improvement of solar photovoltaic (PV) based on maximum power point tracking (MPPT) controller / Siti Munirah Ahmad Saad by Siti Munirah, Ahmad Saad

    Published 2018
    “…This MPPT using perturb and observe algorithm, the algorithm are general algorithm and use as a code. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Performance Analysis of Motion Estimation Algorithms on Digital Video Images by Ali, Nur Alisa, Ja'afar, Abd Shukur, Abd Rahim, Rosman, Mohammed Napiah, Zul Atfyi Fauzan, Md Yusop, Azdiana, Meor Said, Maizatul Alice

    Published 2011
    “…An improvement on redundancy to achieve high compression ratio in video coding is developed. Block Matching Motion Estimation (BMME) techniques have been particularly used in various coding standards. …”
    Get full text
    Get full text
    Article
  17. 17

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18

    Tranformation of CPU-based Applications To Leverage on Graphics Processors using CUDA by Hussin, Fawnizu Azmadi, Mohd Nazlee, Anas, Zain Ali, Noohul Basheer

    Published 2010
    “…This research focuses on measuring the performance of CUDA and implementing CUDA for a scientific computation involving the process of porting the source code from CPU to GPU using direct integration technique. …”
    Get full text
    Get full text
    Article
  19. 19

    Super Calculator using Compute Unified Device Architecture (CUDA) by Nazlee, Anas Mohd

    Published 2009
    “…This research focuses on measuring the performance of CUDA and implementing CUDA for a scientific computation involving the process of porting the source code from CPU to GPU using direct integration technique. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Comparative study of secant, Fixed point and Sixth section methods for solving root in nonlinear equation / Nik Syahrul Naim Abdul Rahman by Abdul Rahman, Nik Syahrul Naim

    Published 2017
    “…Numerical analysis is to solve the functions for finding root by using a few numerical methods such as Secant, Fixed point and Sixth section methods to solve the functions for finding root. …”
    Get full text
    Get full text
    Thesis