Search Results - (( java implementation using algorithm ) OR ( using 3d tree algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  3. 3

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Three dimension reconstruction of coronary artery tree using single-view cineangiogram by Khaleel, Hasan Hadi, O. K. Rahmat, Rahmita Wirza, Dimon, Mohd Zamrin, Mahmod, Ramlan, Mustapha, Norwati

    Published 2010
    “…Whereas most of the conventional techniques propose using multiview cineangiograms to reconstruct 3D objects this article proposes to integrate a Three Dimension(3D) model of the coronary artery tree using a standard single-view cineangiogram. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Treemap algorithm for dynamic stormwater infiltration movement into soil surface by Siti Nurbaidzuri, Binti Reli @ Raily, Izham, Mohamad Yusoff, Habibah, Lateh, Muhamad Uznir, Ujang

    Published 2015
    “…Although most of the previous studies use Tree algorithm for 2D analysis, this study highlights the capability of the algorithm in 3D analysis by producing hierarchy for soil depth.…”
    Get full text
    Get full text
    Get full text
    Proceeding
  7. 7

    Treemap algorithm for dynamic stormwater infiltration movement into soil surface by Reli, Siti Nurbaidzuri, Yusoff, Izham Mohamad, Lateh, Habibah, Ujang, Uznir

    Published 2015
    “…Although most of the previous studies use Tree algorithm for 2D analysis, this study highlights the capability of the algorithm in 3D analysis by producing hierarchy for soil depth.…”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  10. 10

    Three-dimension coronary artery tree curvature confirmation by Khaleel, Hasan Hadi, O. K. Rahmat, Rahmita Wirza, Dimon, Mohd Zamrin, Mahmod, Ramlan, Mustapha, Norwati

    Published 2010
    “…We propose to use the standard deviation technique to compare the output features of the 3D coronary artery trees. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Expression invariant face recognition using multi-stage 3D face fitting with 3D morphable face model by Alomari, Abdallah A., Khalid, Fatimah, O. K. Rahmat, Rahmita Wirza, Abdullah, Muhamad Taufik

    Published 2010
    “…This 3D morphable model algorithm can be widely used for 3D face analysis and 3D face recognition in real time scenarios.…”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Integrated reconstruction of 2D overlapping coronary artery from x-ray angiography with 3D virtual myocardial model using non-rigid iterative closest point algorithm by Omar, Mahmood Mohammed Ali

    Published 2019
    “…This motivates the 3D reconstruction of real coronary arteries superimposed on a 3D virtual heart model using a non-rigid iterative closest point algorithm, which is the focus of this thesis. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Efficient 3D stereo vision stabilization for multi-camera viewpoints by Bhuiyan, Sharif Shah Newaj, Khalifa, Othman Omran

    Published 2019
    “…Then improved the connectivity of correct matching pairs by minimizing the global error using spanning tree algorithm. Tree algorithm helps to stabilize randomly positioned camera viewpoints in linear order. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Estimating tree height based on tree crown from UAV imagery / Suzanah Abdullah ... [et al.] by Abdullah, Suzanah, Tahar, Khairul Nizam, Abdul Rashid, Mohd Fadzil, Osoman, Muhammad Ariffin

    Published 2022
    “…As a result, this study has obtained the tree crown from the Digital Surface Model (DSM) that is filtered locally based on pixel size using the selected algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Café Web Based System Using Priority Scheduling Approach by Fatimah, Ghazali, Rohana, Ismail, Mohamad Hariz, Hasni

    Published 2017
    “…The system is implemented at UniSZA’s café where two different types of user will use the system. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project
  19. 19
  20. 20

    Disparity map algorithm using hierarchical of bitwise pixel differences and segment-tree from stereo image by Zainal Azali, Muhammad Nazmi

    Published 2024
    “…The adaptability of the algorithm is demonstrated through a 3D surface reconstruction using a final disparity map. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis