Search Results - (( developing block path algorithm ) OR ( java implementation during algorithm ))

Refine Results
  1. 1

    Design and analysis multiple paths trace back and reconstruction module for DNA sequence alignment accelerator using ASIC design flow: article / Nurul Ain Husaini by Husaini, Nurul Ain

    Published 2010
    “…The first objective is to construct the trace back and reconstruction module of the S-W algorithm with the multiple blocks and the functionality for each block. …”
    Get full text
    Get full text
    Article
  2. 2

    Design and analysis multiple paths trace back and reconstruction module for DNA sequence alignment accelerator using ASIC design flow / Nurul Ain Husaini by Husaini, Nurul Ain

    Published 2010
    “…The first objective is to construct the trace back and reconstruction module of the S-W algorithm with the multiple blocks and the functionality for each block. …”
    Get full text
    Get full text
    Student Project
  3. 3

    Nlfxlms and thf-nlfxlms algorithms for wiener-hammerstein nonlinear active noise control by Srazhidinov, Radik

    Published 2016
    “…Using this method, the need for the knowledge of the degree of nonlinearity in advance can be avoided. The proposed algorithm models the Wiener-Hammerstein linear and nonlinear components in the secondary path and applies the estimated degree of nonlinearity of the nonlinear secondary path in the control algorithm design.In previous works, SEF-NLFXLMS and THF-NLFXLMS algorithms for Hammerstein and Wiener structures were developed where the acoustic path is assumed to be a unit gain. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5

    Routing problem in rectangular mesh network using shortest path based Greedy method by Noraziah, Adzhar, Shaharuddin, Salleh, Yuhani, Yusof, Muhammad Azrin, Ahmad

    Published 2019
    “…In order to achieve this objective, each net need to be routed as shortest as possible. Therefore, developing a shortest path based routing algorithm is in need. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Routing problem in rectangular mesh network using shortest path based Greedy method by Noraziah, Adzhar, Shaharuddin, Salleh, Yuhani, Yusof, Muhammad Azrin, Ahmad

    Published 2019
    “…In order to achieve this objective, each net need to be routed as shortest as possible. Therefore, developing a shortest path based routing algorithm is in need. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8

    A new hybrid multiaxial fatigue life model based on critical plane continuum damage mechanics and genetic algorithm by Masood, Kamal

    Published 2015
    “…Genetic algorithm is also applied for the calibration of proposed model in terms of calibrated coefficients. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Arfict: Indoor navigation mobile application using augmented reality (AR) for FICT by Lee, Chorng Huah

    Published 2025
    “…The system employs a marker-based localisation method using QR codes decoded with the ZXing library to establish the user’s initial position. Navigation paths are optimised using the A* algorithm, while ARCore integrates sensor data from the device’s gyroscope and accelerometer to enhance tracking accuracy. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack by Izaddoost, Alireza

    Published 2008
    “…In past two decades, Internet has developed rapidly and has integrated in many aspects of human life. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  13. 13

    Routing problem in rectangular mesh network using Dijkstra’s based Greedy method by Noraziah, Adzhar, Shaharuddin, Salleh, Yuhani, Yusof, Muhammad Azrin, Ahmad

    Published 2018
    “…In order to achieve this objective, each net need to be routed as shortest as possible. Therefore, developing a shortest path based routing algorithm is in need. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Motion estimation on homogenous surface for around view monitoring system by Hanizam, Syahirah, Nik Hashim, Nik Nur Wahidah, Zainal Abidin, Zulkifli, Mohd Zaki, Hasan Firdaus, Abdul Rahman, Hasbullah, Mahamud, Nurul Hidayah

    Published 2020
    “…The procedure is time-consuming and increases the cost of development. We propose to develop two ultra-wide-angle cameras located on the front and rear vehicle integrated with the motion estimation (ME) algorithm to produce a parking bird eye view and forward/backward trajectory lines. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    Data Hiding Techniques In Digital Images by Al Thloothi, Salah Ramadan

    Published 2003
    “…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. The proposed system is then designed and developed using Java programming language. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To prevent overfitting, early stopping is used to monitor validation loss during training and dropout rate of 0.3 are applied. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis