Search Results - (( java implementation model algorithm ) OR ( problem implementation matching algorithm ))
Search alternatives:
- implementation matching »
- problem implementation »
- implementation model »
- java implementation »
- model algorithm »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
2
Simulated kalman filter (SKF) based image template matching for distance measurement by using stereo vision system
Published 2018“…Based on literature, stereo algorithm is already being implemented to solve the distance measurement problem. …”
Get full text
Get full text
Thesis -
3
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
4
GPU-based odd and even hybrid string matching algorithm
Published 2016“…String matching is considered as one of the fundamental problems in computer science.Many computer applications provide the string matching utility for their users, and how fast one or more occurrences of a given pattern can be found in a text plays a prominent role in their user satisfaction.Although numerous algorithms and methods are available to solve the string matching problem, the remarkable increase in the amount of data which is produced and stored by modern computational devices demands researchers to find much more efficient ways for dealing with this issue.In this research, the Odd and Even (OE) hybrid string matching algorithm is redesigned to be executed on the Graphics Processing Unit (GPU), which can be utilized to reduce the burden of compute-intensive operations from the Central Processing Unit (CPU).In fact, capabilities of the GPU as a massively parallel processor are employed to enhance the performance of the existing hybrid string matching algorithms.Different types of data are used to evaluate the impact of parallelization and implementation of both algorithms on the GPU. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
6
SKF-based image template matching for distance measurement by using stereo vision
Published 2018“…The traditional algorithm to solve image matching problem take a lot of memory and computational time. …”
Get full text
Get full text
Get full text
Get full text
Book Chapter -
7
Design issues and challenges of an FPGA-based orthogonal matching pursuit implementation for compressive sensing reconstruction
Published 2020“…There are several CS reconstruction approaches, and orthogonal matching pursuit (OMP) is one of the best and popular algorithms implemented. …”
Get full text
Get full text
Conference or Workshop Item -
8
Combining Recursive Least Square and Principal Component Analysis for Assisted History Matching
Published 2014“…This project will study the applicability of the combined algorithm for history matching problem. The study conducted on PCA and RLS method shows high chances of success in applying these methods for history matching problem. …”
Get full text
Get full text
Final Year Project -
9
Image recognition using Artificial Immune systems approach
Published 2009Get full text
Working Paper -
10
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…The performance of Java programming model and native programming model are compared with respect to the execution time for blood vessel detection. …”
Get full text
Get full text
Conference or Workshop Item -
11
Malay cuisine cooking recipe recommendation system using Genetic Algorithm (GA) / Nur Nazihah Ismail
Published 2017“…However, there are a few problems exists by using current system such as it is does not match with the available ingredients that user have. …”
Get full text
Get full text
Student Project -
12
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
Get full text
Get full text
Final Year Project -
13
Fingerprint recognition system
Published 2005“…To solve this problem,a prototype for recognition fingerprint was implemented the Fast Fourier Transform (FFT) technique for features extraction and Euclidean Distance for template matching.The waterfall methodology has been used in this prototype because it can provide an orderly sequence of development steps and help to ensure the and quality,reliability, maintainability.Features extraction algorithm will produce the reference number.In addition, template matching algorithm will do the comparison between the fingerprint image based on the reference number either it is similar or not.As a result of this technique, the input fingerprint image will be match with the store fingerprint image if there are the similar images. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Panoramic image matching method for UAV remote sensing based of sift algorithm
Published 2024text::Final Year Project -
15
-
16
Disparity map algorithm for stereo matching process using local based method
Published 2022“…The proposed SVDM algorithm involves four stages which starts from matching cost computation. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The methodology used in this study begun with problem identification, requirement identification, analysed the model process and design the simulation model. The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
18
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
19
-
20
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. The results of False Matching Ratio (FMR) was 16.67% whilst the False Non-Matching Ratio (FNMR) was 33.33%. …”
Get full text
Get full text
Thesis
