Search Results - (( software identification using algorithm ) OR ( java application model algorithm ))
Search alternatives:
- software identification »
- identification using »
- application model »
- java application »
- using algorithm »
- model algorithm »
-
1
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
4
Thermoelectric cooler identification based on continuous-time hammerstein model using metaheuristics algorithm
Published 2021Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
6
Register Transfer Level Implementation Of Pooling - Based Feature Extraction For Finger Vein Identification
Published 2017“…The proposed algorithm extracted the local feature information of the finger vein pattern (patches), and used these patches to improve the robustness of the identification. …”
Get full text
Get full text
Thesis -
7
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali
Published 2022“…The system algorithm is verified and validates on two sloped bumps surface topographies that have been simulated using MATLAB software and measured using the Alicona Infinite Focus Measurement (IFM) device, respectively. …”
Get full text
Get full text
Thesis -
9
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
10
-
11
Texture-based feature using multi-blocks gray level co-occurrence matrix for ethnicity identification
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Discrete-Time System Identification Based On Novel Information Criterion Using Genetic Algorithm
Published 2017“…This shall be tested using computational software on a number of simulated systems. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
-
14
Hardware Software Partitioning Using Particle Swarm Optimization (PSO) In Image Processing Application
Published 2018“…In this project, car plate identification will be implemented in hardware-software partitioning by using PSO algorithm. …”
Get full text
Get full text
Monograph -
15
Online fingerprint recognition
Published 2010“…All the systems will be built using MATLAB software…”
Get full text
Get full text
Undergraduates Project Papers -
16
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
Get full text
Get full text
Final Year Project -
17
Comparison Of Crossover In Genetic Algorithm For Discrete-Time System Identification
Published 2021“…This paper investigates the effect of different types of crossover, namely, single-point, double-point, multiple-point and uniform crossover, within GA in producing an optimum model structure for system identification. This was carried out using a computational software on a number of simulated data. …”
Get full text
Get full text
Get full text
Article -
18
Modelling of the anti-collision algorithm in RFID system: article / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Article -
19
Modelling of the anti-collision algorithm in RFID system / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Thesis -
20
Secure Image Steganography Using Encryption Algorithm
Published 2016“…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
Get full text
Get full text
Conference or Workshop Item
