Search Results - (( developing extraction path algorithm ) OR ( java application designing algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3

    Very Large Scale Integration Cell Based Path Extractor For Physical To Layout Mapping In Fault Isolation Work by Pragasam, Matthew

    Published 2017
    “…This development and study of the path extract method carries significance in areas of EDA and debug diagnosis work.…”
    Get full text
    Get full text
    Thesis
  4. 4

    Graph processing hardware accelerator for shortest path algorithms in nanometer very large-scale integration interconnect routing by Ch'ng, Heng Sun

    Published 2007
    “…This thesis proposes a graph processing hardware accelerator for shortest path algorithms applied in nanometer VLSI interconnect routing problems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Online Mapping-Based Navigation System for Wheeled Mobile Robot in Road Following and Roundabout by Ali, Mohammed A. H., Mailah, Musa

    Published 2018
    “…In this work, the online mapping of mobile robot employing the utilization of sensor fusion technique is used to extract the road characteristics that will be used with path planning algorithm to enable the robot to move from a certain start position to predetermined goal, such as road curbs, road borders, and roundabout. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  6. 6

    STEP-NC Interpolator for General 2D and 3D Parametric Curve / Dzullijah Ibrahim...[et al.] by Ibrahim, Dzullijah, Yaakob, Yusli, Hussin, Norasikin, Samad, Zahurin

    Published 2017
    “…A hierarchical-based algorithm is used to extract the tool path data from STEP-NC tool path file of a product model. …”
    Get full text
    Get full text
    Article
  7. 7

    Developing and validating a simulation model for counting and classification of vehicles by Ali Emad Jehad, Riza Atiq O.K. Rahmat

    Published 2016
    “…An algorithm system approach has been presented for extracting traffic data using video image processing. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10
  11. 11

    Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine by Fathi Mahdi Elsiddig Haroun, Mr.

    Published 2023
    “…Also, a corridor extraction algorithm has been developed to extract the region of interest (ROI) around the transmission towers. …”
    text::Thesis
  12. 12

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15
  16. 16

    An Investigation of Classical Model Predictive Controller Path Tracking Performance of a Two-Wheel and Four-Wheel Steering Vehicle by H., Che Shamsudin, Muhammad Izhar, Ishak, Mohamad Heerwan, Peeie, Muhammad Aizzat, Zakaria

    Published 2024
    “…Studies on self-driving vehicles have become a trend in recent years, and many systems have been developed to enable autonomous manoeuvre. Various methods have been used to improve path-tracking algorithms which increase vehicle performance, including tracking accuracy and stability. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
    Get full text
    Get full text
    Thesis
  18. 18

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Animal voice recognition for identification (ID) detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2011
    “…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. The developed animal voice recognition system uses the zero-cross-rate (ZCR), Mel-Frequency Cepstral Coefficients (MFCC) and Dynamic Time Warping (DTW) joint algorithms as the tools for recognizing the voice of the particular animal. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Dog voice identification (ID) for detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2012
    “…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. The developed animal voice recognition system uses the zero-cross-rate (ZCR), Mel-Frequency Cepstral Coefficients (MFCC) and Dynamic Time Warping (DTW) joint algorithms as the tools for recognizing the voice of the particular animal. …”
    Get full text
    Get full text
    Conference or Workshop Item