Search Results - (( developing extraction path algorithm ) OR ( java application designing algorithm ))
Search alternatives:
- developing extraction »
- application designing »
- designing algorithm »
- java application »
- extraction path »
- path algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
3
Very Large Scale Integration Cell Based Path Extractor For Physical To Layout Mapping In Fault Isolation Work
Published 2017“…This development and study of the path extract method carries significance in areas of EDA and debug diagnosis work.…”
Get full text
Get full text
Thesis -
4
Graph processing hardware accelerator for shortest path algorithms in nanometer very large-scale integration interconnect routing
Published 2007“…This thesis proposes a graph processing hardware accelerator for shortest path algorithms applied in nanometer VLSI interconnect routing problems. …”
Get full text
Get full text
Get full text
Thesis -
5
Online Mapping-Based Navigation System for Wheeled Mobile Robot in Road Following and Roundabout
Published 2018“…In this work, the online mapping of mobile robot employing the utilization of sensor fusion technique is used to extract the road characteristics that will be used with path planning algorithm to enable the robot to move from a certain start position to predetermined goal, such as road curbs, road borders, and roundabout. …”
Get full text
Get full text
Get full text
Book Chapter -
6
STEP-NC Interpolator for General 2D and 3D Parametric Curve / Dzullijah Ibrahim...[et al.]
Published 2017“…A hierarchical-based algorithm is used to extract the tool path data from STEP-NC tool path file of a product model. …”
Get full text
Get full text
Article -
7
Developing and validating a simulation model for counting and classification of vehicles
Published 2016“…An algorithm system approach has been presented for extracting traffic data using video image processing. …”
Get full text
Get full text
Get full text
Article -
8
-
9
Feature extraction: hand shape, hand position and hand trajectory path
Published 2011Get full text
Get full text
Get full text
Book Chapter -
10
-
11
Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine
Published 2023“…Also, a corridor extraction algorithm has been developed to extract the region of interest (ROI) around the transmission towers. …”
text::Thesis -
12
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
13
-
14
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
15
-
16
An Investigation of Classical Model Predictive Controller Path Tracking Performance of a Two-Wheel and Four-Wheel Steering Vehicle
Published 2024“…Studies on self-driving vehicles have become a trend in recent years, and many systems have been developed to enable autonomous manoeuvre. Various methods have been used to improve path-tracking algorithms which increase vehicle performance, including tracking accuracy and stability. …”
Get full text
Get full text
Get full text
Article -
17
Network game (Literati) / Chung Mei Kuen
Published 2003“…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
Get full text
Get full text
Thesis -
18
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
Get full text
Get full text
Conference or Workshop Item -
19
Animal voice recognition for identification (ID) detection system
Published 2011“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. The developed animal voice recognition system uses the zero-cross-rate (ZCR), Mel-Frequency Cepstral Coefficients (MFCC) and Dynamic Time Warping (DTW) joint algorithms as the tools for recognizing the voice of the particular animal. …”
Get full text
Get full text
Conference or Workshop Item -
20
Dog voice identification (ID) for detection system
Published 2012“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. The developed animal voice recognition system uses the zero-cross-rate (ZCR), Mel-Frequency Cepstral Coefficients (MFCC) and Dynamic Time Warping (DTW) joint algorithms as the tools for recognizing the voice of the particular animal. …”
Get full text
Get full text
Conference or Workshop Item
