Search Results - (( java implementation using algorithm ) OR ( ((using coding) OR (joint coding)) using algorithm ))

Refine Results
  1. 1

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…The optimization on ANPR was performed on the pre-processing step using our own Java code as currently there is no image processing library available on the standard Android mobile phone. …”
    Get full text
    Get full text
    Get full text
    Book
  2. 2

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    A new dynamic code assignment algorithm for joint CDMA and SDMA system by Odeh, Nidhal A. S., Khatun, Sabira, Ismail, Alyani, Mohd Ali, Borhanuddin

    Published 2008
    “…This article describes an optimal dynamic code assignment algorithm, which can be used to maximize the total number of users in combined C-SDMA system with minimum required quality of service (QoS) and limited number of codes. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Development of Finite Element Code for Non-Linear Analysis of Interlocking Mortarless Masonry System by Ahmed Al- Wathaf, Ahmed Hasan

    Published 2006
    “…The developed experimental setups used in this study successfully revealed the important features of the interlocking mortarless joint. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Fast mode decision algorithm by Maarif, Haris Al Qodri, Gunawan, Teddy Surya, Khalifa, Othman Omran

    Published 2011
    “…The default is the scalable video coding model \vhich is represented by Joint Scalable Video Model (JSVM). …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  10. 10

    Biometrics electronic purse by Abdul Rahman, Abdul Wahab, Eng, Chong Tan, S., M. Heng

    Published 1999
    “…A 56-bit DES encryption algorithm can easily be broken in just 2 to 3 days using the EFF DES CRACKER, an unclassified ASIC machine. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Improved undetected error probability model for JTEC and JTEC-SQED coding schemes by Flayyih, Wameedh Nazar, Samsudin, Khairulmizam, Hashim, Shaiful Jahari, Rokhani, Fakhrul Zaman, Ismail, Yehea I.

    Published 2013
    “…This paper presents an improved mathematical model to estimate the undetected error probability of these two joint coding schemes. According to the decoding algorithm the errors are classified into patterns and their decoding result is checked for failures. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
    Get full text
    Get full text
    Thesis
  13. 13

    Efficient mobile video transmission based on a joint coding scheme by Azni, Mohamed, Boudjadja, Rima, Dahmani, Abdelnasser, Zennir, Mohamed Nadjib

    Published 2017
    “…In this paper, we propose a joint coding design which uses the Symbol Forward Error Correction (S-FEC) at the application layer. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The appropriate Java codes are developed for solve this task. The developed patterns are applied in the field of real-time analysis. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Development of learning algorithm of passive joint for 3R under-actuated robot / Mohd Amiruddin Fikri Yaakob by Yaakob, Mohd Amiruddin Fikri

    Published 2015
    “…The approach embedded Artificial Neural Network (ANN) algorithm and SIMULINK block diagram. Experiments were conducted to predict an algorithm on position angle measurement either SIMULINK block diagram or program code method applied to three joints; Active 1, Active 2 and Passive respectively. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…The study recommends to use another type of digital signature algorithm to be used in the proposed method. …”
    Get full text
    Get full text
    Student Project
  17. 17

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  18. 18

    Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems by Marzook, Ali Kamil, Ismail, Alyani, Mohd Ali, Borhanuddin, Sali, Aduwati, Khalaf, Mohannad H., Khatun, Sabira

    Published 2013
    “…In time division-synchronous code division multiple access systems, the channel estimation for multiple subscribers requires the computation of very complicated algorithms through short training sequences. …”
    Get full text
    Get full text
    Article
  19. 19

    Classroom finder system with student availability, space and time constraint by Loh, Yong Bin

    Published 2024
    “…Scrum methodology was selected for the development methodology of this project while the tools of HTML, CSS, JavaScript, Bootstrap, Jinja2 Template Engine, Flask, SQLite and VS Code are used in the development of this project. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    Design and Analysis of a Dynamic Space-Code Multiple Access with Large Area Synchronous Scheme Using the Smart Antenna System by Ng, Chee Kyun

    Published 2007
    “…The size of IFW is adaptable with the size of smart antenna beamwidth through dynamic space code (DSC) algorithm. Hence, this double signatures scheme forms a novel multiple access scheme called Dynamic Space Code Multiple Access (DSCMA) system. …”
    Get full text
    Get full text
    Thesis