Search Results - (( java implementation using algorithm ) OR ( using code ((window algorithm) OR (_ algorithm)) ))
Search alternatives:
- implementation using »
- java implementation »
- window algorithm »
- using algorithm »
- using code »
-
1
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
Get full text
Get full text
Get full text
Book -
2
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
3
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
4
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
Get full text
Get full text
Thesis -
5
Chain code algorithm in deriving T-Junction and region of a freehand sketch
Published 2004“…The algorithm is based on 8-connected 3x3 windows of Freeman chain code. …”
Get full text
Get full text
Get full text
Article -
6
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. …”
Get full text
Get full text
Thesis -
7
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
8
Line clipping based on parallelism approach and midpoint intersection
Published 2014“…The main property is considered in this algorithm is the parallelism with window boundary to define the clipped line.For parallel lines with window boundaries no need to use intersection point method to find the coordinates of the end points of the clipped line.Midpoint algorithm is used to determine the intersection point with the clipped boundary for non-parallel lines. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Biometrics electronic purse
Published 1999“…A 56-bit DES encryption algorithm can easily be broken in just 2 to 3 days using the EFF DES CRACKER, an unclassified ASIC machine. …”
Get full text
Get full text
Get full text
Proceeding Paper -
10
Network game (Literati) / Chung Mei Kuen
Published 2003“…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
Get full text
Get full text
Thesis -
11
Image clustering comparison of two color segmentation techniques
Published 2010“…The appropriate Java codes are developed for solve this task. The developed patterns are applied in the field of real-time analysis. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
-
13
PCB defect detection system using run-length encoding
Published 2017“…Both of the PCB test and PCB original images was created an analysis window. Each of the analysis windows contents the RLE code. …”
Get full text
Get full text
Student Project -
14
The enhancement of mammographic images of breast cancer using median filtering (software development ) / Noor Saedah Selamat
Published 1996“…These algorithm are written in C code using BORLAND C++ in Windows environment , improvise the poor image to become a clear image using enhancement techniques. …”
Get full text
Get full text
Thesis -
15
Classroom finder system with student availability, space and time constraint
Published 2024“…Scrum methodology was selected for the development methodology of this project while the tools of HTML, CSS, JavaScript, Bootstrap, Jinja2 Template Engine, Flask, SQLite and VS Code are used in the development of this project. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
17
Filling and restoration of cracked digitized paintings based on preserved neighbourhood pixels
Published 2021“…The algorithm was evaluated by implementing PSNR (Peak Signal-to-noise ratio) and MSE (Mean Square error), and MATLAB was used to build the code required to process and analyze the data.…”
Get full text
Get full text
Get full text
Article -
18
Agent-based extraction algorithm for computational problem solving
Published 2015“…Additionally, IPO_Agent not only produces the same PAC’s output results, but also generates module number and represents these results in another window. Finally,Algorithm_Agent employs the extracted information provided by IPO_Agent to produce the pseudo-code of the given problem and shows it in separate window. …”
Get full text
Get full text
Thesis -
19
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
20
