Search Results - (( (same OR some) equalization based algorithm ) OR ( java application using algorithm ))
Search alternatives:
-
1
Message based random variable length key encryption algorithm.
Published 2009“…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
Get full text
Get full text
Article -
2
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
3
Garbage truck staff duty roster using genetic algorithm / Nadea Suneeza Zulkifli
Published 2017“…The constraint is defined as the minimum number of each staff being assigned in the work shift in the same day and time. Experimental result shows that my three-dimensional array staffscheduling implementation based on the best problem solution of the minimum violated working time of each staff works for 28 days equally to avoid overpay.…”
Get full text
Get full text
Thesis -
4
-
5
Development of committee machine models for multiple response optimization problems
Published 2014“…The results represent Global Desirability of proposed algorithm is equal or higher than GD of case studies. …”
Get full text
Get full text
Thesis -
6
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
7
A variant fisher and Jaikuamr algorithm to solve capacitated vehicle routing problem
Published 2017“…Fisher and Jaikumar algorithm is a well-known cluster based method which creates clusters with a geometric method partitioning the customer plane into equal angular cones where the total cones are equal to the number of vehicles. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Segmentation of MRI brain images using statistical approaches
Published 2011“…Therefore, these algorithms can be improved upon. A neighbourhood-based noise-reduction algorithm which uses the edges of an image is proposed. …”
Get full text
Get full text
Thesis -
9
A comparison of watermarking image quality based on dual intermediate significant bit with genetic algorithm
Published 2013“…In this case, when the two hidden bits are equal to the original bits, there will be no change to the other remaining bits.However, if the original value is not equal to the embedded one, the nearest pixel to the original one will be chosen as the watermarked image.The second method, GA method is used to embed two bits of watermarking data within every pixel of the original image and to find the optimal value based on the existing DISB.On the other hand, if the two embedded bits are equal to the original bits then this means the watermarked image is still the same as the original one without any changes, while in the other case GA is used in determining the minimum fitness value in which the fittest is the absolute value between the pixel and chromosome and the value of chromosome between 0-255.The results indicate that the two methods produce a high quality watermarked image, but there is a big difference in the processing time, so the DISB method is faster than the GA method.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Cellular Automata-based Algorithm for Liquid Diffusion Phenomenon Modeling using imaging technique
Published 2013“…Then, thousands of images, as the same number of original images, are created by the CA-based algorithm. …”
Get full text
Get full text
Thesis -
11
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Indoor global path planning based on critical cells using dijkstra algorithm
Published 2015“…The algorithm uses floor plan of any environment discretized to some equal-sized square grids. …”
Get full text
Get full text
Article -
13
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
14
Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff
Published 2021“…In this thesis, the second part of chaos-based secure communication is introducing a new encryption algorithm to improve the security of modern chaos-based communication systems. …”
Get full text
Get full text
Get full text
Thesis -
15
QR factorization equalisation scheme for mode devision multiplexing transmission in fibre optics
Published 2016“…This is done by trying to avoid the issues accompanied with the development of the previous algorithms that have been utilized for the same goal. …”
Get full text
Get full text
Get full text
Thesis -
16
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
New global maximum power point tracking and modular voltage equalizer topology for partially shaded photovoltaic system / Immad Shams
Published 2022“…In terms of controller-based, in this work, a new global maximum power point tracking (GMPPT) algorithm based on a modified butterfly optimization algorithm (MBOA) has been proposed. …”
Get full text
Get full text
Get full text
Thesis -
18
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
19
An FPGA implementation of exp-bet scheduling algorithm in LTE networks / Yusmardiah Yusuf
Published 2017“…Scheduling mechanism is the process of dynamically allocating radio resources (time and frequency) to User Equipment (UE) that transmits different flows at the same time. It is performed by the scheduling algorithm implemented in the Long Term Evolution (LTE) base station, Evolved Node B. …”
Get full text
Get full text
Thesis -
20
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item
