Search Results - (( parallel visualization techniques algorithm ) OR ( java application during algorithm ))
Search alternatives:
- visualization techniques »
- application during »
- java application »
- during algorithm »
-
1
Parallel visualization approach of a 3D heart model
Published 2008Get full text
Get full text
Conference or Workshop Item -
2
Image based autonomous indoor parallel parking assist on omni-directional vehicle (ODV)
Published 2016“…The image processing algorithm is first developed using Visual Studio C++ and OpenCV. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Partitioning techniques and their parallelization for stiff system of ordinary differential equations
Published 2007“…The graphs of its performance and execution time, visualize the advantages of parallelizing.…”
Get full text
Get full text
Thesis -
4
Active contour model on digital mammograms using low-cost parallel computing systems
Published 2009“…Results obtained imply that the PCS is prospective for image visualization purposes.…”
Get full text
Book Section -
5
-
6
Design and implementation of multimedia digital matrix system
Published 2005“…The essential of multimedia support in M-DMS is high-speed digital interfacing technique. In this case, back plane communication technique has been changed from parallel architecture to serial. …”
Get full text
Get full text
Conference or Workshop Item -
7
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
8
-
9
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
10
Implementation of a Symmetric Chaotic Encryption Scheme
Published 2004“…However, traditional cryptosystems demand high computational complexity andhigh digital signal processors which in return increases the cost of implementation. There is parallel growth in cryptographic techniques which originated anintense research activity and the search for new directions in cryptography such as chaotic encryption. …”
Get full text
Get full text
Final Year Project -
11
-
12
-
13
A coded aperture-based 3D SPECT imaging system for early breast cancer detection
Published 2023“…Single Photon Emission Computed Tomography (SPECT) is an established imaging modality that is undertaken using a parallel-hole collimator. This technique suffers from clinical limitations as it has less reliability in detecting small lesions (less than one centimeter in diameter) due to trade-off between sensitivity and resolution. …”
Get full text
Get full text
Get full text
Thesis -
14
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
15
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
16
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
An automated multimodal white matter hyperintensities identification in MRI brain images using image processing / Iza Sazanita Isa
Published 2018“…The first stage is preprocessing procedure that combines the thresholding and filtering algorithm for pre processing the MRI images while the second stage contains two phases of main processing techniques of enhancement and segmentation. …”
Get full text
Get full text
Book Section -
18
An automated multimodal white matter hyperintensities identification in MRI brain images using image processing / Iza Sazanita Isa
Published 2018“…The first stage is preprocessing procedure that combines the thresholding and filtering algorithm for pre processing the MRI images while the second stage contains two phases of main processing techniques of enhancement and segmentation. …”
Get full text
Get full text
Thesis -
19
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis
