Search Results - (( developing building does algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- java implication »
- does algorithm »
- building does »
-
1
-
2
A new approach to derive buildings footprint from light detection and ranging data using rule-based learning techniques and decision tree
Published 2022“…Therefore, it is important to create the footprint of the buildings, especially in developing cities, which is highly time-consuming and costly. …”
Get full text
Get full text
Article -
3
Detecting indoor positioning of moving object using wifi triangulation algorithm for kid tracker application
Published 2016“…Hence, „Detecting Indoor Positioning of Moving Object using Wi-Fi Triangulation Algorithm for Kid Tracker Application‟ as a part of process in Kid Tracker Application to keep track our kids movement by focusing inside the building (shopping mall). …”
Get full text
Get full text
Undergraduates Project Papers -
4
Visual Public-Key Cryptosystems.
Published 2012“…Until recently, building a highly secured public-key cryptosystem without utilizing complex computations has been a serious challenge, making it necessary for investigations to develop new cryptography methods. …”
Get full text
Get full text
Monograph -
5
Algorithm for calculation of cephalometric soft tissue facial traits
Published 2007“…This paper presents development of a new soft tissue analysis algorithm, which will be used as an analysis tool in Computer Assisted Craniofacial Surgery Planner – a surgery planning system under development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Design and development of cooperative simultaneous localization and mapping integrated with neural network for mobile robot
Published 2024“…Secondly, a framework of CSLAM algorithm integrated with ANN using Rao-Blackwellized particle filter (RBPF) algorithm for single SLAM robot, and the map merging using random sample consensus (RANSAC) algorithm, is designed and developed. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
8
A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations
Published 2011“…Until recently, building a highly secured public-key cryptosystem without utilizing complex computations has been a serious challenge, making it necessary for investigations to develop new cryptography methods. …”
Get full text
Get full text
Thesis -
9
Library reservation system using face detection / Nik Ruslawati Nik Mustapa and Nur Athikah Fatehah Rosli
Published 2022“…Thus, Reservation System using face recognition for the library was developed to overcome this situation. In this paper, the researcher will use the Haar Cascade Algorithm to scan the face and MySQL as a database to detect the room and time slot for a reservation. …”
Get full text
Get full text
Get full text
Article -
10
Runtime pluggable CPU scheduler for linux operating system
Published 2010“…It also provides a flexible interface for kernel developers which facilitates the evaluation and testing for their newly developed scheduling algorithms. …”
Get full text
Get full text
Thesis -
11
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…However, IEEE 802.1 In standard does not specify a scheduling algorithm to guarantee QoS. …”
Get full text
Get full text
Thesis -
12
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…The key semantic difference between FEs and DDoS is that the former represents legitimate access of the website while the latter does not. However, this does not help in discriminating them automatically. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
A realtime Runner Help Me mobile application using geolocation technique / Nurul Amierah Abd Rahman
Published 2019“…Besides, the personal runner cannot guarantee the safety of customer items since customer cannot track them and it will build lack of trust in between of customer and the runner. …”
Get full text
Get full text
Thesis -
14
Interferometric array planning using division algorithm for radio astronomy applications
Published 2017“…In the second scheme, a genetic algorithm is developed, in order to optimize a correlator array of antennas by using Genetic Algorithm (GA). …”
Get full text
Get full text
Thesis -
15
Development of low cost autonomous wheelchair using gps for outdoor purposes
Published 2021“…To solve that problem a simple algorithm is developed to improve the accuracy in positioning and path planning for the wheelchair. …”
Get full text
Get full text
Thesis -
16
-
17
Integration Of Machine Vision In Industrial Robot For Automated Composite Panel Punching
Published 2018“…The aim of this research is to build a machine vision algorithm for assisting KUKA robot in recognizing and calibrating various shapes of composite panels precisely. …”
Get full text
Get full text
Thesis -
18
Multi-sensor fusion for automated guided vehicle positioning
Published 2010“…Absolute positioning does not have drift error but the system cost is high and has signal blockage inside buildings as in case of landmarks and GPS respectively. …”
Get full text
Get full text
Get full text
Thesis -
19
Development of robust procedures for partial least square regression with application to near infrared spectral data
Published 2021“…Hence, a Robust Reliable Weighted Average (RRWA-PLS) which does not require the selection of an optimal number of PLS is developed by employing the weighted average strategy from multiple PLSR models generated by different complexity of the PLS components. …”
Get full text
Get full text
Thesis -
20
LTE-based passive radar for ground target detection and tracking
Published 2015“…All the results revealed the effectiveness of the LTE-based passive radar, which can be developed and implemented in many practical applications including border protection, traffic surveillance and building monitoring.…”
Get full text
Get full text
Thesis
