Search Results - (( java implementation using algorithmic ) OR ( using code ((_ algorithm) OR (based algorithm)) ))

Refine Results
  1. 1

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
    Get full text
    Get full text
    Get full text
    Book
  2. 2
  3. 3

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…In the software development testing we examine image based clustering, as we can used clustering by distance base, by pixel (red, green, blue) value etc., The problem is solved by region based method which is based on connect component and background detection techniques. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
    Get full text
    Get full text
    Thesis
  7. 7

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  9. 9

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We extracted 30 different features from network traffic. We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Biometrics electronic purse by Abdul Rahman, Abdul Wahab, Eng, Chong Tan, S., M. Heng

    Published 1999
    “…A 56-bit DES encryption algorithm can easily be broken in just 2 to 3 days using the EFF DES CRACKER, an unclassified ASIC machine. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    Development of computer aided three-dimensional geometric modeler based on designer's idea in twodimensional by Haron, Habibollah

    Published 2006
    “…These algorithm are used to produce chain code series that represented a thinned binary image of the sketch. …”
    Get full text
    Get full text
    Monograph
  14. 14

    Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2015
    “…In this method, permission-based features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    A new corner detection algorithm for chain code representation. by Haron , Habibollah, Shamsuddin , Siti Mariyam, Mohamed, Dzulkifli

    Published 2005
    “…The algorithm is based on chain-coded image, deriving the slope between each code, analyze the series of chain code, and finally decide the existence of corner at the current pixel location. …”
    Get full text
    Get full text
    Article
  17. 17

    Expanding the data capacity of QR codes using multiple compression algorithms and base64 encode/decode by Abas, Azizi, Yusof, Yuhanis, Ahmad, Farzana Kabir

    Published 2017
    “…This study focuses on the selection of compression algorithms and use base64 encoder/decoder to increase the capacity of data which is to be stored in the QR code. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Fast algorithm for VQ-based wavelet coding system by Khalifa, Othman Omran

    Published 2003
    “…In this paper, a modified version of (Linde-Buzo-Gray)LBG algorithm using Partial Search Partial Distortion (PSPD) is presented for coding the wavelet coefficients. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Using RGB colour combination in coloured quick response (QR) code algorithm to enhance QR code capacity by Azizi, Abas

    Published 2018
    “…The algorithm that includes encoding and decoding processes is based on the red, green, and blue (RGB) colour techniques, which are used to create high capacity coloured QR code. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Aplikasi rangkaian neural dalam pengesanan simpang bagi penterjemah lakaran pintar by Subri, Syarul Haniz

    Published 2006
    “…Back propagation neural network algorithm was used to develop and produce the classifier for corner detector algorithm. …”
    Get full text
    Get full text
    Thesis