Search Results - (( java application using algorithm ) OR ( ((based filing) OR (based coding)) system algorithm ))
Search alternatives:
- java application »
- system algorithm »
- using algorithm »
- based filing »
- based coding »
-
1
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…Hence, the objective of this research is to propose suitable and optimize algorithm for ANPR system on Android mobile phone. …”
Get full text
Get full text
Get full text
Book -
2
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
4
Songs Search Using Human Humming Voice
Published 2007“…Java programming language is used to build the system. The system has the functionality of humming voice recording and algorithms comparing both humming voice and song files in the system to fmd the right song. …”
Get full text
Get full text
Final Year Project -
5
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…The prototypes will be developed using JAVA language united with a MySQL database. …”
Get full text
Get full text
Final Year Project -
6
Network game (Literati) / Chung Mei Kuen
Published 2003“…The category of networking would serves to be a small foundation from which to base the future scenario of other reliable multicast and real time web based gaming system.…”
Get full text
Get full text
Thesis -
7
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
8
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
9
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
10
Improved rsync algorithm to minimize communication cost using multi-agent systems for synchronization in multi-learning management systems
Published 2017“…Remote file synchronization (RFS) is based on updating the outdated version of a file that resides on one machine to be similar to the new version of the updated file in another machine at a minimum computation time (cost). …”
Get full text
Get full text
Get full text
Thesis -
11
Development of open platform controller for step-NC compliant CNC system
Published 2020“…Therefore, this study covers the system which has been designed and developed from outdated and conventional PROLIGHT 1000 Milling CNC machine from Light Intelitek as the lesser cost solution which further discussed in detail based upon upgrades of hardware, architecture, and algorithm design. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application
Published 2021“…Android has become the number one mobile operating system in term of worldwide market share since May 2012. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Steganography algorithm to hide secret message inside an image
Published 2011“…By applying the proposed algorithm, a system called Steganography Imaging System (SIS) is developed. …”
Get full text
Get full text
Article -
14
Parallelization of speech compression based algorithm based on human auditory system on multicore system
Published 2012“…The objective of this research is to develop and implement a novel parallel speech compression algorithm based on human auditory system on a multicore system. …”
Get full text
Get full text
Get full text
Article -
15
Vision-based robot indoor navigation
Published 2022“…To conclude, a vision-based indoor navigation robot training system is effectively established. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
17
Development Of Generative Computer-Aided Process Planning System For Lathe Machining
Published 2019“…These functions always create irregular data descriptions in current CAD and CAM system supply and demand. This study attempts to solve this problem by recognizing the part model’s features via its geometrical based and produce sub-delta volumes that can later be used to generate manufacturing feature-based data for CAM in a single system via generations of algorithm through open source 3D CAD modeller. …”
Get full text
Get full text
Thesis -
18
Adopting morphology method in camera based EAN-13 1D barcode recognition using Simulink: article / Siti Nor Safinaz Ozaimidi
Published 2012“…In barcode recognition, the symbols were up sampled and compared with codebook to determine the corresponding code. A result of barcode numbers saved in file.mat is used for product matching code. …”
Get full text
Get full text
Article -
19
The study of stemming algorithm on Malay words that begin with alphabets P, Q, Y, and Z from the translated Al-Quran / Suriani Mat
Published 2001“…The performance of a Malay stemming algorithm is tested based on words beginning with letter 'p', 'q', 'y' and 'z', using 5 experiments. …”
Get full text
Get full text
Thesis -
20
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article
