Search Results - (( java implementing function algorithm ) OR ( image implementation phase algorithm ))
Search alternatives:
- implementing function »
- image implementation »
- implementation phase »
- function algorithm »
- java implementing »
- phase algorithm »
-
1
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…The prototypes will be developed using JAVA language united with a MySQL database. Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
Get full text
Get full text
Final Year Project -
2
Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim
Published 2022“…These phases are Requirement Gathering and Analysis Phase, Design Phase, and Implementation Phase. …”
Get full text
Get full text
Get full text
Book Section -
3
Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim
Published 2022“…These phases are Requirement Gathering and Analysis Phase, Design Phase, and Implementation Phase. …”
Get full text
Get full text
Get full text
Book Section -
4
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
5
A new image scrambling approach using block-based on shifted algorithm
Published 2013“…The first part of the algorithm aims to build a shifted table using hash function within scramble phase and descramble phase to generate an scrambled (shifted) image and the retrieved image. …”
Get full text
Get full text
Get full text
Article -
6
Face expression recognition using artificial neural network (ANN) / Mazuraini Ghani
Published 2005“…This project is all about implementing the back-propagation neural network algorithm in classification of face expression. …”
Get full text
Get full text
Thesis -
7
An enhanced Blowfish Algorithm based on cylindrical coordinate system and dynamic permutation box
Published 2014“…The research involved three phases, algorithm design, implementation, and evaluation. …”
Get full text
Get full text
Get full text
Thesis -
8
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020“…PHPMyAdmin is used to store the dataset and also acts as a database for user information. The algorithm chosen was implemented using Java Programming language and was tested using Root Means Square Error (RMSE) formula.…”
Get full text
Get full text
Thesis -
10
A new image scrambling technique using block rotation algorithm based on Rubik’s cube
Published 2013“…The first part of the algorithm aims to build a rotation table using hash function within scramble phase and descramble phase to generate a scrambled (rotated) image and the retrieved image. …”
Get full text
Get full text
Get full text
Article -
11
Songs Search Using Human Humming Voice
Published 2007“…The system has the functionality of humming voice recording and algorithms comparing both humming voice and song files in the system to fmd the right song. …”
Get full text
Get full text
Final Year Project -
12
Car plate recognition system : (segmentation)
Published 2005“…Therefore, the development of the safety prototype is a stepping-stone to ensure that the safety control is getting better.The prototype is a car plate recognition prototype based on the acquired car plate image. However, in this research, it only focuses on two phases of the recognition phase which are car plate thinning phase and car plate segmentation phase.The technique that was used in every phase is based on the algorithms that are developed by previous researchers. …”
Get full text
Get full text
Undergraduates Project Papers -
13
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
Get full text
Get full text
Conference or Workshop Item -
14
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…E-Certificate helps eliminate many problems that is associated with physical printed certificate such costs, management, and forgery problem. Even though implementation of such E-Certificate have been implemented around the globe, it has not been implemented for workshops in UiTM. …”
Get full text
Get full text
Thesis -
15
Automated road traffic census using image processing technique
Published 2013“…In this phase, information of bounding box such as center point, width and height of the identified vehicles are used in implementing the counting and classification algorithm. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
16
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
Get full text
Get full text
Thesis -
17
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis -
18
Segmenting microcalcifications using enhanced distance active contour (EDAC) / Siti Salmah Yasiran
Published 2010“…The third phase involves the implementation of the EDAC on a set of real mammograms. …”
Get full text
Get full text
Thesis -
19
-
20
FRUIT RECOGNITION APPLICATION USING MACHINE LEARNING
Published 2023“…In the image acquisition phase, the system gathers a dataset of images that will be used for training and testing. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD
