Search Results - (( based implementation some algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Improving on the network lifetime of clustered-based wireless sensor network using modified leach algorithm by Zeni, Saltihie

    Published 2012
    “…Meanwhile in LEACH, the cluster head selection was based on distributed algorithm. Both of these protocols was implemented in network simulator to compare the performance. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation by Chen, Soong Der

    Published 2000
    “…This thesis focuses on ways to improve the existing solutions in the algorithmic and implementation aspects. For the algorithmic aspect, the basic principles of motion compensated DCT block-based compression scheme was studied. …”
    Get full text
    Get full text
    Thesis
  3. 3

    SEGMENTATION OF ANTI-NUCLEAR ANTIBODY IMAGES BASED ON WATERSHEDS AND FAST REGION MERGING by Mehfar, Noor Liyana

    Published 2013
    “…Watershed segmentation algorithms are combining edge and region based techniques. …”
    Get full text
    Get full text
    Final Year Project
  4. 4
  5. 5
  6. 6

    JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation by Abu, Ahmad Zaidee

    Published 2008
    “…The proposed approach uses a frequency domain combinational framework of coefficients scrambling with Key Scheduling Algorithm based (KSA-based) permutation. This novel algorithm applies coefficients scrambling using Combined-Reverse-and-Normal-Direction (CRND) scanning together with Distorted DC permutation (DDP). …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    VITILIGO LESION ASSESSMENT TOOL ON SMARTPHONE by BORETSKAYA, VIKTORIYA

    Published 2013
    “…Thus, to make Vitiligo analysis system available to unspecialized users, the android based system using smartphone is envisaged. The algorithm therefore needs to be rewritten for smartphone. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    A new algorithm on Graphical User Authentication (GUA) based on multi-line grids by Lashkari, Arash Habibi, Gani, Abdullah, Sabet, Leila Ghasemi, Farmand, Samaneh

    Published 2010
    “…Thereafter a comparative analysis of all Recall-Based algorithms based on attack patterns of graphical user authentication is tabulated. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Cluster Analysis of Data Points using Partitioning and Probabilistic Model-based Algorithms by Raheem, Ajiboye Adeleke, Hauwau, Isah-Kebbe, O., Oladele Tinuke

    Published 2014
    “…This study explores the performance accuracies of partitioning-based algorithms and probabilistic model-based algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm by Diallo, Alhassane Saliou, Al-Khateeb, Wajdi Fawzi Mohammed, Olanrewaju, Rashidah Funke, Fatai, Sado

    Published 2014
    “…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Sequential and parallel multiple tabu search algorithm for multiobjective urban transit scheduling problems by Uvaraja, Vikneswary

    Published 2018
    “…Additionally, the MTS algorithm is also implemented in parallel computing to produce parallel MTS for generating comparable solutions in shorter computational times. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Immune-based technique for undergraduate programmes recommendation / Muhammad Azrill Mohd Zamri by Mohd Zamri, Muhammad Azrill

    Published 2017
    “…A framework for the immune-based technique is discovered in this study. Based on the framework, a prototype was implemented to evaluate the accuracy of the proposed technique. 52% is the highest accuracy obtained from the technique by using ten-fold cross validation. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Fuzzy modeling of brain tissues in Bayesian segmentation of brain MR images by Farzan, Ali, Ramli, Abdul Rahman, Mashohor, Syamsiah, Mahmud, Rozi

    Published 2010
    “…Results show that our algorithm performs well in comparison with the one implemented in SPM. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Token based path allocation approach for mobile robots in sorting centre for achieving high throughput by Khoo, Zong Zheng

    Published 2024
    “…This project proposes an improved path-finding algorithm that implements token-based path finding while a robot wants to access a grid cell. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Outdoor marker-less tracking and pose calculating system for mobile augmented reality by Rehman, Ullah Khan

    Published 2014
    “…A proof of concept mobile AR system is implemented as part of this thesis. Experiments and many evaluations are conducted to validate the proposed algorithms on iPhone. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    Indoor global path planning based on critical cells using dijkstra algorithm by Azrul Amri, Jamal, Engku Fadzli Hasan, Syed Abdullah, Fatma Susilawati, Mohamad

    Published 2015
    “…The algorithm uses floor plan of any environment discretized to some equal-sized square grids. …”
    Get full text
    Get full text
    Article