Search Results - (( data compression modified algorithm ) OR ( java implementation path algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Use of new efficient lossless data compression method in transmitting encrypted Baptista symmetric chaotic cryptosystem data by Daud, M.A., Ariffin, M.R.K., Kularajasingam, S., Hussin, C.H.C., Juhan, N., Hasni, M.M.

    Published 2016
    “…The purposed algorithm has fast encoding and decoding mechanism and proven analytically to be a lossless data compression technique. …”
    Get full text
    Get full text
    Article
  5. 5

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Soap performance enhancement for high volume messaging / Ali Baba Dauda by Ali Baba , Dauda

    Published 2018
    “…To achieve this aim, LZ77 compression algorithm is modified to encode more symbols. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Frame selection based on modified entropy and object motion for secured data hiding in videos by Muhammad Fuad, Abdullah

    Published 2021
    “…A message was embedded by modifying middle DCT coefficients using the proposed algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Review of wavelet theory and its application to image data compression by Khalifa, Othman Omran

    Published 2003
    “…Advantages over Fourier transform is investigated and several results are derived. The pyramid algorithm is also presented and some features of wavelets in image data compression are given. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Compression of Three-Dimensional Terrain Data Using Lifting Scheme Based on Second Generation Wavelets by Pradhan, Biswajeet

    Published 2006
    “…The newly developed algorithm was applied to compress Light Detection and Ranging (LIDAR) data to check the efficiency of the program. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Development Of A Robust Blind Digital Video Watermarking Algorithm Using Discrete Wavelet Transform by Al-Deen, Ahmed A. Baha'a

    Published 2007
    “…Video watermarking technology enables us to hide an imperceptible, robust, and secure data in digital or analog video. This data can be used for tracking, fingerprinting, copyright infringement detection or any other application that requires some hidden data. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Video steganography based on DCT psychovisual and object motion by Muhammad, Fuad, Ernawan, Ferda

    Published 2020
    “…A message is embedded by modifying middle DCT coefficients using the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Video steganography based on DCT psychovisual and object motion by Muhammad, Fuad, Ernawan, Ferda

    Published 2020
    “…A message is embedded by modifying middle DCT coefficients using the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Handwriting recognition using webcam for data entry by Wong , Yoong Xiang

    Published 2014
    “…The Handwriting Recognition using Webcam for Data Entry project has its primary purpose to develop a system or algorithm that is robust enough to recognize numerical handwritings. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Handwriting recognition using webcam for data entry by Xiang, W.Y., Sebastian, P.

    Published 2015
    “…However, the testing were later enhanced with another feature extraction module, which consists of the combination of Character Vector Module, Kirsch Edge Detection Module, Alphabet Profile Feature Extraction Module, Modified Character Module and Image Compression Module. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Discrete-time system identification using genetic algorithm with single parent-based mating technique by Zainuddin, Farah Ayiesya

    Published 2024
    “…The study's results were validated using real-world data from industrial systems, including a hair dryer, an air compression system, and a flexible robot arm. …”
    Get full text
    Get full text
    Get full text
    Thesis