Search Results - (( java implication based algorithm ) OR ( using ((coding using) OR (reading using)) algorithm ))
Search alternatives:
- implication based »
- java implication »
- reading using »
- coding using »
-
1
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
2
Using RGB colour combination in coloured quick response (QR) code algorithm to enhance QR code capacity
Published 2018“…The proposed algorithm integrates the use of compression, multiplexing, and multilayer techniques in encoding and decoding the QR code. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Bar Code Detection Using Omnidirectional Vision for Automated Guided Vehicle Navigation
Published 2012“…Images from omnidirectional camera are known to be distorted against the height of the object. We present an algorithm for detecting and reading barcodes successfully without correcting the image distortion. …”
Get full text
Get full text
Conference or Workshop Item -
4
Chain coding and pre processing stages of handwritten character image file
Published 2010“…This paper discusses in detail some of the algorithms used in the pre-processing stages of an offline handwritten character image file. …”
Get full text
Get full text
Get full text
Article -
5
Securing quick response (QR) code using steganography / Muhammad Danial Mohd Alwi
Published 2021“…I have enhancing the QR-code steganography method by using LSB technique in RGB images and QR-code data input image pattern. …”
Get full text
Get full text
Student Project -
6
Real-time barcode reader using active vision
Published 2004“…An adaptive thresholding algorithm is used to reduce the effects of uneven illumination. …”
Get full text
Get full text
Thesis -
7
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Obfuscation is used to convert source code into a program that works the same way but is much harder to read and understand. …”
Get full text
Get full text
Thesis -
8
Iot health monitoring system for self quarantined covid-19 patients
Published 2022“…Then to get the temperature reading we use some algorithm to calculate the temperature reading from sensor. …”
Get full text
Get full text
Undergraduates Project Papers -
9
-
10
Protection of the texts using Base64 and MD5
Published 2012“…The main objective of the use of encryption algorithms is to protect data and information in order to achieve privacy. …”
Get full text
Get full text
Get full text
Article -
11
Automatic detection and indication of pallet-level tagging from rfid readings using machine learning algorithms
Published 2020“…In order to further validate the position of the tagging in the pallet box of the Random Forest model developed, a different predefined location was used to validate the model. The best position that could achieve a classification accuracy of 93.30% through the validation process for position five (5) in the systematic model that is the centre of the pallet box. …”
Get full text
Get full text
Thesis -
12
Development of low power viterbi decoder on complex programmable logic device platform
Published 2018“…Consequently, the number of logic gates and the total power consumption of the STTC Viterbi decoder can be reduced by using the new algorithms. The proposed algorithms have been designed and implemented by using MATLAB, Altera Quartus 2 and Altera MAX V CPLD board. …”
Get full text
Get full text
Get full text
Thesis -
13
Extracting Object Oriented Software Architecture from C++ Source Code
Published 2000“…This research presents a reverse engineering tool VOO++ that will read an Object- Oriented C++ source code using UML notation in order to visualise its Class structure and the various relationships that may exist including, inheritance, aggregation, and dependency relationships based on the modified Cohen-Sutherland clipping algorithm. …”
Get full text
Get full text
Thesis -
14
Design and evaluation of multidimensional turbo product coded MIMO-OFDM system
Published 2007“…The initial work is developing the dimensional-based reading order (DBRO) algorithm for generating the MDTPC codeword sequences. …”
Get full text
Get full text
Thesis -
15
A study on matrix factorization and its applications
Published 2021“…Computational steps are important as it serves the basic knowledge to code it in Python. Python also consists of libraries that can be used to calculate the approximated matrix with some parameter tuning. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code
Published 2022“…A new colour QR code algorithm known as a Fuzzy QR code (FQR code) was proposed to solve the problems faced by current colour QR codes. …”
Get full text
Get full text
Thesis -
17
Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication
Published 2021“…Besides that by using LDPC code the decoding processing time can be reduced. …”
Get full text
Get full text
Get full text
Thesis -
18
Library reservation system using face detection / Nik Ruslawati Nik Mustapa and Nur Athikah Fatehah Rosli
Published 2022“…The users are not allowed in a close place, especially in a building or room. The library that used to be packed with people reading books, studying, and using the computer is now becoming empty. …”
Get full text
Get full text
Get full text
Article -
19
Spatial variations prediction in carbonate porosity using artificial neural network: Subis Limestones, Sarawak, Malaysia
Published 2019“…The images were processed using the Image Analysis, coded before use as a training and input data set for ANN. …”
Get full text
Get full text
Article -
20
Spatial variations prediction in carbonate porosity using artificial neural network: Subis Limestones, Sarawak, Malaysia
Published 2019“…The images were processed using the Image Analysis, coded before use as a training and input data set for ANN. …”
Get full text
Get full text
Article
