Search Results - (( java implementation during algorithm ) OR ( making based coding algorithm ))
Search alternatives:
- implementation during »
- java implementation »
- during algorithm »
- coding algorithm »
- based coding »
-
1
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We propose a new method of analysing Android Intent in Java code, which includes implicit intent and explicit intent. …”
Get full text
Get full text
Get full text
Thesis -
2
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Afterward evolutionary algorithm (EA) was employed to prioritize test cases based on the rate severity of fault detection per unit test cost. …”
Get full text
Get full text
Thesis -
3
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Fast algorithm for VQ-based wavelet coding system
Published 2003Get full text
Get full text
Get full text
Proceeding Paper -
5
ADAPTIVE MODULATION AND CODING FOR WIMAX SYSTEMS
Published 2006“…The third is a blind autocorrelation based Linear Predictor Interpolator. Fixed transmission systems make use of average modulation and coding which has reasonable performance in both high and low SNR conditions in the communication channel. …”
Get full text
Get full text
Final Year Project -
6
Detection of head position using chain code algorithm
Published 2007“…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
Get full text
Get full text
Thesis -
7
Detection of head position using chain code algorithm
Published 2007“…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
Get full text
Get full text
Thesis -
8
The performance of block decoding using Dorsch algorithm / Husna Abdul Rahman, Ros Shilawani S. Abdul Kadir and Farah Yasmin Abdul Rahman.
Published 2007“…The aim of this project is to investigate the Dorsch algorithm performance in the decoding process of various block codes. …”
Get full text
Get full text
Research Reports -
9
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
10
Rain streaks removal using total variation and sparse coding based on case based reasoning approach
Published 2024journal::journal article -
11
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…We utilized the enhanced Q-Learning algorithm to compare actions, including context-based actions, to effectively achieve higher code coverage. …”
Get full text
Get full text
Get full text
Thesis -
12
Block based low complexity iterative QR precoder structure for Massive MIMO
Published 2021“…As the user terminals have strict restraints on physical dimensions, processing capabilities and power availability are extremely limited (relative to the base station). Therefore, we study the solutions from the literature in which most of the interference cancellation is performed by the base station (pre-coding). …”
Get full text
Get full text
Thesis -
13
Implementation of sinusoidal pulse width modulation based on cordic algorithm using silterra 0.18µm CMOS technology: article
Published 2009“…The use of Coordinate Rotation Digital Computer (CORDIC) in the source code make it provides an area-efficient architecture for effective design at Silterra 0.18µm CMOS technology.…”
Get full text
Get full text
Article -
14
Implementation of sinusoidal pulse width modulation based on cordic algorithm using silterra 0.18um CMOS technology / Nurul Hidayah Marzuki
Published 2009“…The use of Coordinate Rotation Digital Computer (CORDIC) in the source code make it provides an area-efficient architecture for effective design at Silterra 0.18um CMOS technology.…”
Get full text
Get full text
Thesis -
15
REGION-BASED ADAPTIVE DISTRIBUTED VIDEO CODING CODEC
Published 2011“…The rate control in DVC is performed by channel coding techniques (turbo codes, LDPC, etc.). The performance of the channel code depends heavily on the accuracy of virtual channel model that models estimation error for each region. …”
Get full text
Get full text
Thesis -
16
Vision-based robot indoor navigation
Published 2022“…A navigation robot is built to test the workability and efficiency of the algorithms. In general, the algorithm can provide the nearest path to navigate around the environment without manual assistance. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Investigation on the dynamic of computation of semi autonomous evolutionary computation for syntactic optimization of a set of programming codes
Published 2007“…Genetic Algorithm as one of the Evolutionary Computation method improve the execution of parallel programming codes by optimizing the number of processors and the distribution of data. …”
Get full text
Get full text
Research Report -
18
Improving the exploration strategy of an automated android GUI testing tool based on the Q-Learning algorithm by selecting potential actions
Published 2022“…We utilise the Q-Learning algorithm to compare actions, including context-based actions, to effectively detect crashes and achieve a higher code coverage.…”
Get full text
Get full text
Article -
19
Securing quick response (QR) code using steganography / Muhammad Danial Mohd Alwi
Published 2021“…In all fields of life, they are increasingly used, particularly with the large distribution of smart phones used as QR code scanners. While there are several benefits to QR codes that make them very common, there are many security problems and risks associated with them. …”
Get full text
Get full text
Student Project -
20
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise
