Search Results - (( basic complex detection algorithm ) OR ( java implementation path algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A detector generating algorithm for intrusion detection inspired by artificial immune system by Alsharafi, Walid Mohamed, Omar, Mohd Nizam

    Published 2015
    “…Artificial immune system (AIS) allows us to inspire several ideas for the design of computer intrusion detection.The standard of negative selection algorithm (NSA), offered by Stephanie Forrest in 1994, is one of the most common mechanisms in AIS that applied in anomaly detection for the similarity of its basic idea. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Shot boundary detection based on orthogonal polynomial by Abdulhussain, Sadiq H., Ramli, Abd Rahman, Mahmmod, Basheera M., Saripan, Mohd Iqbal, Al-Haddad, Syed Abdul Rahman, Jassim, Wissam A.

    Published 2019
    “…The design of SBD algorithms developed from simple feature comparison to rigorous probabilistic and using of complex models. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A real-time vision-based touchless interaction of virtual heart using integration of motion gesture interaction methods by Ng, Ing Kye

    Published 2014
    “…The purpose of Gesture Estimation is to detect gestures and locates the screen coordinates. …”
    Get full text
    Get full text
    Academic Exercise
  9. 9

    Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory by Rusli, Julie Roslita

    Published 2011
    “…Moreover, most of the memory test algorithm does not have the capability to detect and diagnose NPSF. …”
    Get full text
    Get full text
    Thesis
  10. 10

    CYCLOSTATIONARY FEATURES BASED LOW COMPLEXITY MUTLIRESOLUTION SPECTRUM SENSING FOR COGNITVE RADIO APPLICATIONS by Adoum, Bakhit Amine Adoum

    Published 2011
    “…However, the basic idea is the same - the total bandwidth is sensed using coarse resolution energy detection, then, fine sensing is applied to the portion of interest. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Development of land target following system of hexacopter by Zakaria, Abdul Hafiz, Mohd Mustafah, Yasir, M. Hatta, Muhd. Mudzakkir, N. Azlan, Muhd. Nadzif

    Published 2015
    “…The future works include incorporating more complex image processing algorithms to get better target detection performance and more experiments on different real life situations.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE by ABDUL RAZAK, NUSRAH

    Published 2017
    “…Selected basic behaviour-based algorithms such as wallfollower, obstacle avoidance, escape route and target detection are to be combined and its efficiency is measured. …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    Development of automated neighborhood pattern sensitive fault syndrome generator for SRAM by Rusli, Julie Roslita, Mohd Sidek, Roslina, Wan Hasan, Wan Zuha

    Published 2012
    “…With the increasing complexity of memory devices, fault diagnosis is becoming as important as fault detection. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Enhanced Distributed Learning Classifier System For Simulated Mobile Robot Behaviours by Baneamoon, Saeed Mohammed Saeed

    Published 2010
    “…An approach that detects steady state value for calling genetic algorithm (GA) is proposed to overcome the problems of good classifiers deletion and the local minima trap. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Projected majorized-correlation technique for noise filtering and accuracy in orthogonal frequency division multiplexing by Alsaadi, Alaa Abdullah Mohammed

    Published 2020
    “…The second main factor is a multipath fading channel which causes a delay in OFDM signal and results for Inter Symbol Interference Noise (ISI).Basically, phase noise is considered as main problem that causes significant degradation in detecting packet-based OFDM signals. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features by Keshkeh, Kinan, Jantan, Aman, Alieyan, Kamal

    Published 2022
    “…Furthermore, using the basic features, TLSMalDetect achieved the highest accuracy of 93.69% by Naïve Bayes (NB) among the ML algorithms applied. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Website assurance monitoring application with MD5 Hashing and SHA-26 Algorithm / Abdullah Sani Abd Rahman and Samsiah Ahmad by Abd Rahman, Abdullah Sani, Ahmad, Samsiah

    Published 2022
    “…The Website Assurance Monitoring application has been developed based on MD5 hashing technique and SHA26 algorithm. By using Microsoft Visual Basic 6.0, the Graphical User Interfaces (GUIs) of the application to provide an easy or user-friendly monitoring application. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Deep learning-based breast cancer detection and classification using histopathology images / Ghulam Murtaza by Ghulam , Murtaza

    Published 2021
    “…For BrC detection, an efficient and reliable model namely Ensemble BrC Detection Network (EBrC-Net) and three misclassification reduction (McR) algorithms are developed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Performance optimization method in OFDM based on majorization and minimization technique by Al-Saadi, Alaa Abdullah, Latip, Rohaya, Muhammed, Abdullah

    Published 2019
    “…In this paper, we demonstrate and simulate a practical algorithm to mitigate phase noise which induces ICI .This algorithm is termed as Tight Quadratic Majorization (TQM) and is derived for phase noise estimation. …”
    Get full text
    Get full text
    Get full text
    Article