Search Results - (( its application need algorithm ) OR ( code applications using algorithms ))*
Search alternatives:
- applications using »
- code applications »
- application need »
- using algorithms »
- its application »
- need algorithm »
-
1
New Fast Block Matching Algorithm Using New Hybrid Search Pattern And Strategy To Improve Motion Estimation Process In Video Coding Technique
Published 2016“…Up until today, video compression algorithm has been applied in various video applications ranging from video conferencing to video telephony. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code
Published 2022“…A Quick Response (QR) code is a popular type of two-dimensional barcode that is widely used in various applications. …”
Get full text
Get full text
Thesis -
3
Dynamic bandwidth allocation (DBA) for Fi-Wi realization using IN USRP
Published 2024text::Final Year Project -
4
A review of lossless audio compression standards and algorithms
Published 2017Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
Optimizing lossless compression by normalized data length in Huffman Algorithm
Published 2022“…The proposed new algorithm has more optimal CR than the various variants of the Huffman-based lossless application. …”
Get full text
Get full text
Get full text
Thesis -
6
Task scheduling in cloud computing using hybrid genetic algorithm and bald eagle search (GA-BES)
Published 2022“…The genetic algorithm was widely used because of its accuracy and simplicity. …”
Get full text
Get full text
Get full text
Academic Exercise -
7
OPTIMIZATION OF PID CONTROLLER FOR INVERTED PENDULUM SYSTEM USING GENETIC ALGORITHM
Published 2005Get full text
Get full text
Final Year Project -
8
REGION-BASED ADAPTIVE DISTRIBUTED VIDEO CODING CODEC
Published 2011“…The recently developed Distributed Video Coding (DVC) is typically suitable for the applications where the conventional video coding is not feasible because of its inherent high-complexity encoding. …”
Get full text
Get full text
Thesis -
9
Optimized differential evolution algorithm for linear frequency modulation radar signal denoising
Published 2013“…The main contention of this thesis is to investigate the development of new optimization technique based on Differential Evolution algorithm (DE), applied for radar signal denoising application. …”
Get full text
Get full text
Thesis -
10
Optimization of coded signals based on wavelet neural network
Published 2015“…We performed evaluation using 13-bit, 35-bit and 69-bit Barker codes as signal codes to WNN. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Speed Efficient Hardware Implementation Of Advanced Encryption Standard (Aes)
Published 2017“…This thesis presents a high throughput design of the 128-bit AES algorithm using loop unrolling, pipelined architecture and LUT approach which is able to work in parallel to allow accurate synchronization in order to fulfill the real time application needs. …”
Get full text
Get full text
Thesis -
12
-
13
-
14
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…As the smartphone industry grows rapidly, smartphone applications need to be faster and real-time. For this purpose, most of the smartphone platforms run the program on the native language or compiler that can produce native code for hardware. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Harmony search-based robust optimal controller with prior defined structure
Published 2013“…The second level compnses of two HS optimization algorithms developed and coded for robust stability examinations. …”
Get full text
Get full text
Thesis -
16
The usage of watermarking to store patient information and diagnosis in medical images
Published 2011Get full text
Get full text
Undergraduates Project Papers -
17
DEVELOPMENT OF AN OPTICAL STRAIN MEASUREMENT METHOD
Published 2011Get full text
Get full text
Thesis -
18
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Obfuscation involves transforming potentially revealing data, renaming useful classes and variables (identifiers) names to meaningless labels or adding unused or meaningless code to an application binary. …”
Get full text
Get full text
Thesis -
19
A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate
Published 2019“…To conform to the application requirements of the IoT, the new algorithm improves w-NAF, where w=4. …”
Get full text
Get full text
Thesis -
20
Development of portable automatic number plate recognition system on android mobile phone
Published 2013“…ANPR system for mobile phone need to be optimize due to its limited CPU and memory resources, its ability for geo-tagging image captured using GPS coordinates and its ability to access online database to store the vehicle’s information. …”
Get full text
Get full text
Get full text
Article
