Search Results - (( _ constructive ((method algorithm) OR (path algorithm)) ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3

    Route optimization using shortest path method / Muhamad Faisal Amin Shakri by Shakri, Muhamad Faisal Amin

    Published 2025
    “…This study investigated the implementation and comparison between well known shortest path method which are Dijkstra’s algorithm, Bellman-Ford, and A* algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…The suggested algorithm outperforms the competition in terms of improving path cost, smoothness, and search time. …”
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7

    An efficient algorithm to improve oil-gas pipelines path by Hasan Almaalei, Nabeel Naeem, Mohd Razali, Siti Noor Asyikin, Mohammed Alduais, Nayef Abdulwahab

    Published 2018
    “…Therefore, the aim of this study is to propose a new algorithm to obtain the shortest path connecting oil-gas wells and addressing obstacles that may appear on the path connecting any two wells. …”
    Get full text
    Article
  8. 8

    Optimal QoS aware multiple paths web service composition using heuristic algorithms and data mining techniques by Qtaish, Osama Kayed Taher

    Published 2014
    “…The aim is to solve the above-mentioned problems via an optimization mechanism based upon the combination between runtime path prediction method and heuristic algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Optimizing optimal path trace back for Smith-Waterman algorithm using structural modelling technique by Saliman, Nur Farah Ain

    Published 2012
    “…The optimizing of optimal path trace back system for Smith-Waterman algorithm using structural modelling techniques are presented in this paper. …”
    Get full text
    Get full text
    Student Project
  11. 11

    An application of Floyd-Warshall Algortihm in finding shortest path of order picker in warehouse / Saidatul Aisyah Roslan, Siti Norhakimah Mohd Yatim and Siti Sarah Sulaiman by Roslan, Saidatul Aisyah, Mohd Yatim, Siti Norhakimah, Sulaiman, Siti Sarah

    Published 2019
    “…For the result, shortest path for the order pickers in iterations. The algorithm used can help the order picker to have the shortest path, but it have no direct path. …”
    Get full text
    Get full text
    Student Project
  12. 12

    Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed by Aneesa Ali, Ali Saeed

    Published 2017
    “…For detecting infeasible paths that involve Object Constraints Language (OCL) constraints, new method is needed to cover all the sophisticated constructs of OCL. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    MAZE ROBOT: APPLYING AUTONOMOUS VEHICLE NAVIGATION ALGORITHM WITH EVENT-DRIVEN PROGRAMMING by ABDUL MALEK, NADHIRA

    Published 2011
    “…Hardware and software co-design method is used to construct the mobile robot. The basic navigation algorithm was developed using finite state machine (FSM). …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    Localization using fingerprint method in emergency situation for indoor navigation system / Felix Ceilomond Samam by Samam, Felix Ceilomond

    Published 2015
    “…The results of the fingerprint algorithm for localization shows higher accuracy compare to other methods and the implementation of this method are easy as user require only a mobile device equipped with Wi-Fi facilities to determine the location. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID by Narzullaev, Anvar, Selamat, Mohd Hasan

    Published 2013
    “…Compared to existing calibration procedure our method requires only few signal samples from RFID tags to be collected and rest of the database is recovered using path-loss prediction algorithm.…”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    HTS : a hierarchical method for load balancing in autonomous networks. by Ahmad Zukarnain, Zuriati, Udzir, Nur Izura, Othman, Mohamed

    Published 2008
    “…Proposed algorithm fulfills at two steps. Firstly overload detection function through an explorer algorithm to construct overloaded link table due to disruption link. …”
    Get full text
    Get full text
    Article
  17. 17

    Development of obstable avoidance system for 3D robot navigation by Er, Kai Sheng

    Published 2024
    “…Additionally, the planner and controller modules from Nav2 were employed for path planning and obstacle avoidance. Once the algorithm was fully tested and proven functional in simulation, it would be implemented on the physical robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Design and modelling of an autonomous robotic airship with soft computing control by Wong, Wei Kitt

    Published 2012
    “…Along with the prototype airship, a path planner was also proposed for the UAV for the purpose of obstacle avoidance and path optimization using genetic algorithm to minimize on the distance travelled and to generate the shortest path to cover the specified waypoints. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Frequent itemset mining using graph theory / Mohammad Arsyad Mohd Yakop by Mohd Yakop, Mohammad Arsyad

    Published 2017
    “…The searching process in the FR-Graph involves the construction of two methods: getPath and item-merging. …”
    Get full text
    Get full text
    Thesis
  20. 20