Search Results - (( basic evaluation using algorithm ) OR ( java implementation during algorithm ))

Refine Results
  1. 1

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Routing performance enhancement in hierarchical torus network by link-selection algorithm by Rahman, M.M. Hafizur, Horiguchi, Susumu

    Published 2005
    “…We evaluate the dynamic communication performance of an HTN using dimension-order routing and link-selection algorithms under various traffic patterns. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Dynamic communication performance enhancement in hierarchical torus network by selection algorithm by Rahman, M.M. Hafizur, Sato, Yukinori, Inoguchi, Yasushi

    Published 2012
    “…The dynamic communication performances of an HTN is evaluated by using dimension-order routing and proposed adaptive routing algorithms under various traffic patterns. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Adaptive routing algorithms and implementation for TESH network by Miura, Yasuyuki, Kaneko, Masahiro, Rahman, M.M. Hafizur, Watanabe, Shigeyoshi

    Published 2013
    “…It is found that the communication performance of a TESH network using these adaptive algorithms is better than when the dimension-order routing algorithm is used.…”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Butterfly traffic pattern in selection algorithm on hierarchical torus network by Rahman, M.M. Hafizur, Akhand, M. A. H, Shill, P.C., Inoguchi, Yasushi

    Published 2015
    “…In this paper, we have evaluated the dynamic communication performances of an HTN is evaluated by using dimension-order routing and LS+CS algorithm under butterfly traffic pattern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    Analysis randomness properties of basic components of SNOW 3G cipher in mobile systems by Jassim, Khalid Fadhil, Alshaikhli, Imad Fakhri Taha

    Published 2016
    “…SNOW 3G is a stream cipher algorithm used as encryption algorithm in third generation mobile phone technology (3G-UMTS). …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  9. 9

    High performance hierarchical torus network under matrix transpose traffic patterns by Rahman, M.M. Hafizur, Susumu, Horiguchi

    Published 2004
    “…In this paper, we present a deadlock-free routing algorithm for the HTN using virtual channels and evaluate the network’s dynamic communication performance under matrix transpose traffic, using the proposed routing algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus by Darus, Zamzuhairi

    Published 2003
    “…This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. A multilayer feed-forward artificial neural network (ANN) with evolution programming learning algorithm for calculation of voltage stability margins (VSM). …”
    Get full text
    Get full text
    Thesis
  12. 12

    Evaluation of stereo matching algorithms and dynamic programming for 3D triangulation by Teo, Chee Huat, Manap, Nurulfajar

    Published 2015
    “…The stereo matching algorithms that we applied for experimental purpose are basic block matching, sub-pixel accuracy and dynamic programming. …”
    Get full text
    Get full text
    Book Chapter
  13. 13

    Evaluation Of Stereo Matching Algorithms And Dynamic Programming For 3D Triangulation by Teo , Chee Huat, Abd Manap, Nurulfajar

    Published 2014
    “…The stereo matching algorithms that we applied for experimental purpose are basic block matching, sub-pixel accuracy and dynamic programming. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  14. 14

    Data Hiding Techniques In Digital Images by Al Thloothi, Salah Ramadan

    Published 2003
    “…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. The proposed system is then designed and developed using Java programming language. …”
    Get full text
    Get full text
    Thesis
  16. 16

    The non-uniform communication performance of adaptive routing for hierarchical interconnection network for 3D VLSI by Miura, Yasuyuki, Watanabe, Shigeyoshi, Rahman, M.M. Hafizur

    Published 2015
    “…this paper, we have evaluated the dynamic performance of a TESH network using different non uniform traffic patterns. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Data depublication using : Hashing algorithm / Naimah Nayan by Nayan, Naimah

    Published 2019
    “…The objective of this project is to compare MD5 & SHA-1 algorithm in data deduplication technique and to evaluate the MD5 & SHA-1 algorithm, length of message digest and speed using deduplication software. …”
    Get full text
    Get full text
    Thesis
  18. 18

    High performance hierarchical torus network by Rahman, M.M. Hafizur, Shah, Asadullah, Inoguchi, Yasushi

    Published 2012
    “…The static network performances are derived from the graph model and the DCP is evaluated by using dimension-order routing and newly proposed adaptive routing algorithms under various traffic patterns. …”
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    System identification using Extended Kalman Filter by Alias, Ahmad Hafizi

    Published 2017
    “…In order to evaluate the performance of the EKF learning algorithm, the proposed algorithm validation were analyzed using model validation methods as a checker such as One Step Ahead (OSA) and correlation coefficient (R2). …”
    Get full text
    Get full text
    Student Project
  20. 20

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…The tool is used to evaluate the accuracy of the proposed extraction algorithm to extract the appropriate information which are needed. …”
    Get full text
    Get full text
    Thesis