Search Results - (( process implementation software algorithm ) OR ( java application a algorithm ))

Refine Results
  1. 1

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…It shows that our proposed algorithm improved the recognition rate with negligible additional processing time.…”
    Get full text
    Get full text
    Get full text
    Book
  2. 2

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…This algorithm is an exact algorithm that is specifically for finding the shortest route in a network. …”
    Get full text
    Get full text
    Final Year Project
  4. 4
  5. 5

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Face recognition and identification system (FaceRec) / Khew Jye Huei by Khew , Jye Huei

    Published 2004
    “…Face recognition is a technique to identify an individual by his/her physical characteristic and has been of interest to a growing number of researchers due to its applications on security. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Volunteer Management System by Muhammad Fazril Bin Mohd Amin, Muhammad Fazril

    Published 2012
    “…In conclusion, this software application will save a lot of time and effort on the part of the staff and increase the efficiency with which the volunteers are managed.…”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…Consequently,the implementation of this technique will be applicable to enterprise application such as bank, insurance, group of companies as well as a small and medium organization such as NGO. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Network monopoly / Tan Kean Yeap by Tan , Kean Yeap

    Published 2002
    “…With the powerful networking features of Java, it is expected that this project would produce a "real" game engine. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…There are many challenges of hidden data in the unused area two within executable files, which is dependencies of the size of the cover file with the size of hidden information, differences of the size of file before and after the hiding process, availability of the cover file after the hiding process to perform normally and detection by antivirus software as a result of changes made to the file. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…The developed software agent is utilized to implement prioritized token access subject to the traffic type. …”
    Get full text
    Get full text
    Article
  14. 14

    Literature Survey On Stereo Vision Disparity Map Algorithms by Rostam Affendi, Hamzah, Haidi, Ibrahim

    Published 2016
    “…Generally, the main processing module for a software-based implementation uses only a central processing unit. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Hardware Software Partitioning Using Particle Swarm Optimization (PSO) In Image Processing Application by Tan, Jia Zheng

    Published 2018
    “…In this project, car plate identification will be implemented in hardware-software partitioning by using PSO algorithm. …”
    Get full text
    Get full text
    Monograph
  17. 17

    Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation by Chen, Soong Der

    Published 2000
    “…For the implementation aspect, software-driven media processing was studied. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
    Get full text
    Get full text
    Final Year Project