Search Results - (( developing cost perceptions algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- perceptions algorithm »
- cost perceptions »
- java application »
- developing cost »
-
1
Development of an Electronic Visual Aid for Monocular Visual Impaired Patients
Published 2023“…In a nutshell, this research has successfully developed a cost efficient visual aid for monocular visual impaired patients to have depth perception and a huge increase in the field of vision.…”
text::Thesis -
2
DEVELOPMENT OF AN ELECTRONIC VISUAL AID FOR MONOCULAR VISUAL IMPAIRED PATIENTS
Published 2023“…In terms of software, the algorithms for the field of vision and depth perception was focused. …”
text::Thesis -
3
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
4
Home intruder detection system using machine learning and IoT
Published 2022Get full text
Get full text
Get full text
Article -
5
-
6
A review on monocular tracking and mapping: from model-based to data-driven methods
Published 2022“…Finally, the popular benchmarks available for developing and evaluating these algorithms are presented along with a comparative study on a different class of algorithms. …”
Get full text
Get full text
Article -
7
Grover's Algorithm Extensions - A Systematic Literature Review
Published 2026journal::journal article -
8
Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT
Published 2021“…The performance of the proposed routing algorithm is evaluated utilizing MATLAB. The assessment results indicate that it can find the forwarding path with comparatively low cost in the premise of ensuring security and has minimized the average energy consumption by nearly 50% even as the number of nodes has increased, when compared with the traditional ACO algorithm, an existing ant colony based routing algorithm and a current routing protocol for IoT.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
Cooperative heterogeneous vehicular clustering for road traffic management / Iftikhar Ahmad
Published 2019“…Furthermore, a self-location calculation algorithm is developed to enable vehicles to calculate their location in the absence of global positioning system (GPS) signals. …”
Get full text
Get full text
Get full text
Thesis -
10
-
11
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Development of energy storage system for storing regenerative braking energy from train
Published 2022“…This research aims to explore the development of energy storage systems in railway projects. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Predictive Analytics for Crude Oil Price Using RNN-LSTM Neural Network
Published 2020“…The market price for commodity such as crude oil is influenced by many factors including news, supply-and-demand gap, labour costs, amount of remaining resources, as well as stakeholders' perception. …”
Get full text
Get full text
Conference or Workshop Item -
14
3D imaging techniques in documentation of cultural assets in Malaysia
Published 2015“…Shortage of expertise in many levels of digital practice and general perception that 3D digital documentation is costly and requiring high investments further hampers digitization efforts. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
A real time deep learning based driver monitoring system
Published 2021Get full text
Get full text
Get full text
Article -
16
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Thesis -
17
Zero distortion-based steganography for handwritten signature
Published 2018“…This means that any changes on the cover media (c) could lead to the identification of the stego media (s), which contains the secret message (m). Thus, developing a steganographic algorithm to use cover media (c) without raising attention is the most challenging task in data hiding. …”
Get full text
Get full text
Get full text
Thesis
