Search Results - (( using processing force algorithm ) OR ( java application model algorithm ))
Search alternatives:
- application model »
- using processing »
- processing force »
- java application »
- force algorithm »
- model algorithm »
-
1
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
2
-
3
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
4
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
5
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Calibration of optical based silicone tactile sensor based on image deformation technique / Abdul Halim Esa
Published 2016“…These newly developed algorithms convert unmeasurable image to measureable image using image processing technique. …”
Get full text
Get full text
Thesis -
7
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
8
-
9
Cryptanalysis in cryptographic algorithm design
Published 2006“…Brute force is the process of searching for all possible values of the key. …”
Get full text
Conference or Workshop Item -
10
-
11
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
Get full text
Get full text
Final Year Project -
12
Secure Image Steganography Using Encryption Algorithm
Published 2016“…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
Get full text
Get full text
Conference or Workshop Item -
13
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
Get full text
Get full text
Get full text
Thesis -
14
-
15
Improved criteria determination of an automated negative lightning return strokes characterisation using Brute-Force search algorithm
Published 2021“…Accordingly, the proposed Brute-Force search algorithm characterised the negative lightning return strokes parameters based on the seven parameters. …”
Get full text
Get full text
Thesis -
16
Natural gas liquid (NGL) distillation process using driving force and thermal pinch analysis methods: Energy and economic assessment / Munawar Zaman Shahruddin ... [et al.]
Published 2020“…This research proposes the methodology to determine the optimal sequence of distillation columns by using driving force method. Then, thermal pinch analysis is applied to obtain further energy saving in the process. …”
Get full text
Get full text
Article -
17
Genetic algorithm based for optimizing filter design / Rohana Awang Ahmed
Published 2000“…There is also possibility that the design does not meet specification thus forcing the process to be repeated. This project describe how Genetic Algorithm (GA) could be used to optimize the process of designing analog filter by considering such as magnitude response. …”
Get full text
Get full text
Thesis -
18
Route Planning Analysis In Holes Drilling Process Using Magnetic Optimization Algorithm For Electronic Manufacturing Sector
Published 2013“…Most of the computer numerical controlled machines used nearest neighbour algorithm to plan the route for the drill bit to travel. …”
Get full text
Get full text
Get full text
Article -
19
Automated negative lightning return strokes characterization using brute-force search algorithm
Published 2022“…Hence, this study proposed the development of an automated negative lightning return strokes characterization using a brute-force search algorithm. A total of 170 lightning electric field waveforms were characterized automatically using the proposed algorithm. …”
Get full text
Get full text
Get full text
Article -
20
Automated negative lightning return strokes characterization using brute-force search algorithm
Published 2022“…Hence, this study proposed the development of an automated negative lightning return strokes characterization using a brute-force search algorithm. A total of 170 lightning electric field waveforms were characterized automatically using the proposed algorithm. …”
Get full text
Get full text
Get full text
Article
