Search Results - (( code application _ algorithm ) OR ( its applications out algorithm ))*
Search alternatives:
- code application »
- its applications »
- applications out »
- out algorithm »
-
1
Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code
Published 2022“…The FQR code encoder algorithm provided a novel enhancement to the colour QR code by adding a colour reference to its structure. …”
Get full text
Get full text
Thesis -
2
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…We utilized the enhanced Q-Learning algorithm to compare actions, including context-based actions, to effectively achieve higher code coverage. …”
Get full text
Get full text
Get full text
Thesis -
3
A hybrid database encryption algorithm based on reverse string and dynamic key
Published 2016Get full text
Get full text
Conference or Workshop Item -
4
Implementation of Multigrid Method for Solving Coupled Problem
Published 2021Get full text
Get full text
Monograph -
5
A study on matrix factorization and its applications
Published 2021“…In this project, the application that we focus on is LSI algorithm. LSI is a search algorithm where it returns a set of documents that is related to the keywords that the user searches. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
OPTIMIZATION OF PID CONTROLLER FOR INVERTED PENDULUM SYSTEM USING GENETIC ALGORITHM
Published 2005Get full text
Get full text
Final Year Project -
7
BinDCT Design and Implementation on FPGA with Low Power Architecture
Published 2008“…Its performances in term of Peak Signal-to-Noise (PSNR), compression ratio and coding gain is proved to be best approximation to the DCT algorithm. …”
Get full text
Get full text
Thesis -
8
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…As the smartphone industry grows rapidly, smartphone applications need to be faster and real-time. For this purpose, most of the smartphone platforms run the program on the native language or compiler that can produce native code for hardware. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Wavelets image data compression
Published 1998Get full text
Get full text
Get full text
Proceeding Paper -
10
-
11
Hybrid rocket performance with varying additive concentrations
Published 2013Get full text
Get full text
Get full text
Proceeding Paper -
12
-
13
-
14
STRUCTRAL BEHA VIORE OF REINFORCED CONCRETE BEAMS STRENGTHED FOR SHEAR USING CFRP LAMINATES SUBJECTED TO CYCLIC LOADING
Published 2010“…FRP composite materials are widely employed because of their high strength to weight ratio, environmental resistance and ease of application over materials such as steel. In this research, an analytical model based on non-linear finite element algorithms coded in FORTRAN language was developed to enable the analysis of R.C beams externally strengthened for shear using CFRP laminates subjected to cyclic loads. 20-noded isoparametric quadrilateral elements with three degrees of freedom per each node were used to represent concrete. …”
Get full text
Get full text
Thesis -
15
MicroRNA regulation of human choline kinase gene expression
Published 2019“…MicroRNAs (miRNAs) are a large family of non-coding RNAs that regulate gene expression. Dysregulation of miRNA expression is common in many types of cancer and miRNA profiling has the potential applications for cancer diagnostic and prognostic. …”
Get full text
Get full text
Article -
16
Chain code algorithm in deriving T-Junction and region of a freehand sketch
Published 2004“…The algorithm is based on 8-connected 3x3 windows of Freeman chain code. …”
Get full text
Get full text
Get full text
Article -
17
Automatic marking system for programming subject
Published 2023“…This application handle execution of anonymous code that could be malicious securely by running the code in an isolate environment. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
PERFORMANCE COMPARISON OF NON-INTERLEAVED BCH CODES AND INTERLEAVED BCH CODES
Published 2008Get full text
Get full text
Final Year Project -
19
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…In this method, permission-based features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
Get full text
Get full text
Get full text
Article -
20
