Search Results - (( java implication based algorithm ) OR ( basic preservation through algorithm ))
Search alternatives:
- preservation through »
- basic preservation »
- implication based »
- through algorithm »
- java implication »
-
1
-
2
The Improvement of the Image by Using MATLAB
Published 2006“…Noise reduction is a technique to recover an original image from a degraded one. Basically, this project is focusing on impulsive noise reduction using a nonlinear Spatial filtering whereby an algorithm will be implemented to solve problem faced with standard Median Filter. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
3
Robotic path planning using rapidly-exploring random trees
Published 2013“…Therefore, a path pruning method has been proposed to address this issue and improve the overall performance of the RRTs. Through simulations, the path pruning method has been proven to reduce paths lengths while preserving the aforementioned advantages of RRTs. …”
Get full text
Get full text
Get full text
Thesis -
4
Website assurance monitoring application with MD5 Hashing and SHA-26 Algorithm / Abdullah Sani Abd Rahman and Samsiah Ahmad
Published 2022“…The Website Assurance Monitoring application has been developed based on MD5 hashing technique and SHA26 algorithm. By using Microsoft Visual Basic 6.0, the Graphical User Interfaces (GUIs) of the application to provide an easy or user-friendly monitoring application. …”
Get full text
Get full text
Get full text
Article -
5
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
6
Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation
Published 2000“…This thesis focuses on ways to improve the existing solutions in the algorithmic and implementation aspects. For the algorithmic aspect, the basic principles of motion compensated DCT block-based compression scheme was studied. …”
Get full text
Get full text
Thesis -
7
Digital forensic investigation reduction model (DIFReM) for Windows 10 OS
Published 2018“…The six basic steps defined by Digital Forensics Research Workshop (DFRWS) and generally followed in the forensic investigation are Identification, Preservation, Collection, Examination, Analysis and Presentation. …”
Get full text
Get full text
Thesis -
8
Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks
Published 2024“…Through effective separation of benign from harmful packet flows, this method lessens the burden on the control plane while preserving communication bandwidth. …”
Get full text
Get full text
Get full text
Get full text
Thesis
