Search Results - (( java implication based algorithm ) OR ( encoder application need algorithm ))

Refine Results
  1. 1

    Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code by Badawi, Bakri

    Published 2022
    “…The proposed algorithm consisted of two parts, an encoder and decoder. …”
    Get full text
    Get full text
    Thesis
  2. 2

    REGION-BASED ADAPTIVE DISTRIBUTED VIDEO CODING CODEC by ABDELRAHMAN ELAMIN, ABDELRAHMAN ELAMIN

    Published 2011
    “…The resulting regions map is compressed by employing quadtree algorithm and communicated to the encoder via the feedback channel. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Development of an image rotary encoder for motion control by Ismayuzri, Ishak

    Published 2013
    “…An absolute encoder can determine the angular position without the need to have a reference position. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Development of an image rotary encoder for motion control by Ismayuzri, Ishak

    Published 2013
    “…An absolute encoder can determine the angular position without the need to have a reference position. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing by Hameed, Mustafa Emad

    Published 2022
    “…The compression mechanism is performed using adaptive lossless compression based on Huffman encoding. Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri by Mohd Asri, Nuha Bakizah

    Published 2021
    “…The phenomenal growth of e-commerce applications in the World Wide Web requires the need to increase the security of data communications over the Internet, especially for highly sensitive document transfer. …”
    Get full text
    Get full text
    Student Project
  13. 13
  14. 14
  15. 15

    Automated dual-axis solar tracking system based on astronomical equation and global positioning system by Mohd Sidek, Mohd Hasimi

    Published 2015
    “…To maximize a solar module’s power output the module needs to receive as much direct sunlight as possible. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Soap performance enhancement for high volume messaging / Ali Baba Dauda by Ali Baba , Dauda

    Published 2018
    “…To achieve this aim, LZ77 compression algorithm is modified to encode more symbols. The algorithm is then integrated into two Web services with HTTP and JMS bindings. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    A genetic algorithm to minimise the maximum lateness on a single machine family scheduling problem by Lee, Lai Soon, Nazif, Habibeh

    Published 2009
    “…In this study, we propose an Optimised Crossover Genetic Algorithm (OCGA) for the problem. The objective is to find a schedule which minimises the maximum lateness of the jobs in the presence of the sequence independent family setup times.In brief, the proposed OCGA uses binary representation to encode the problem. …”
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Motion learning using spatio-temporal neural network by Yusoff, Nooraini, Ahmad, Farzana Kabir, Jemili, Mohamad Farif

    Published 2020
    “…In this study, learning is implemented on a reward basis without the need for learning targets.The algorithm has shown good potential in learning motion trajectory particularly in noisy and dynamic settings. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    ECG encryption enhancement with multi-layers of AES and DNA computing by Kh-Madhloom, Jamal

    Published 2023
    “…In order to more effectively incorporate both present technology and developing technology, models of DNA cryptography need to be developed. MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis