Search Results - (( developing implementation using algorithm ) OR ( service application testing algorithm ))

Refine Results
  1. 1

    Development Of Motion Planer And Navigation System For An Office Assistant Robot by Looi, Chen Zheng

    Published 2021
    “…Robot Operating System (ROS) is one of the common platforms to developed these robots. Besides, map was generated by using SLAM algorithm, the costmap was setup and the parameters such as inflation_dist and cost_scaling_factor was studied and tuned based on this application. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment by Perumal, Thinagaran

    Published 2011
    “…Besides, this algorithm provides home users or application developers to implement their own event operators with bespoke syntax for their application purpose by defining cross-events corresponding to the event operators. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Dynamic Feedback Flow Control Algorithms for Unicast and Multicast Available Bit Rate Service in Asynchronous Transfer Mode Networks by Abdelrahman, Ali Mohamed

    Published 2000
    “…In particular, the ABR service has been approved to use the bandwidth left by CBR and VBR services, which is ideal for data applications and can perform well for real-time applications with the appropriate implementation. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Sentiment analysis on airline reviews using Naive Bayes / Nurul Sarah Aliessa Che Harun by Che Harun, Nurul Sarah Aliessa

    Published 2025
    “…In the design and implementation phases, TF-IDF was considered in cleaning and preparing the reviews for application, while the construction of a sentiment analysis model was implemented through the use of the Multinomial Naive Bayes algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Simulation Of Token Bucket Algorithm For Network Traffic Performance by Yusof, Robiah, Mat Nawi, Nor Afifah

    Published 2020
    “…The variables of this algorithm are modified in order to offer the effective proposed token bucket size that can be used in wired network and tested using OPNET modeler. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    XML web services / Wong Kok Chuan by Wong, Kok Chuan

    Published 2003
    “…Next is the implementation phase which covers a brief description on the development environment used, explanations on a few algorithms used and the coding techniques and patterns which I followed. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems by Paniandi, Arul

    Published 2006
    “…The computation intensive modular multiplication operation is based on the Montgomery’s algorithm and implemented using systolic array architecture. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Development of a wireless mesh network routing algorithm for oil and gas pipeline networks by Azman, Amierul Syazrul Azril

    Published 2021
    “…The improvement on packet delivery ratio using OEG algorithm has satisfied the benchmark of packet delivery ratio used by the other researchers for industrial applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Solving multi-objective dynamic vehicle routing problem with time windows using multi-objective algorithm by Khoo, Thau Soon

    Published 2022
    “…Our algorithm uses non-fitness evolutionary distributed parallelized adaptive large neighbourhood search (NEDPALNS). …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Sequential and parallel multiple tabu search algorithm for multiobjective urban transit scheduling problems by Uvaraja, Vikneswary

    Published 2018
    “…The MTS algorithm is coded in ANSI-C language and tested on benchmark data from Mandl's Swiss Network and Mumford's larger data. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Stray animal complaint system using geolocation technique with rule-based Algorithm / Albin Lemuel Kushan … [et al.] by Kushan, Albin Lemuel, Mahadi, Mohamad Tajuddin, Zulhemay, Mohd Nabil, Sadikan, Siti Fairuz Nurr, Mishan, Mohd Taufik

    Published 2021
    “…Although more development is still needed for the project, initial testing shows that local council are able to provide a more efficient service to its local neighbourhoods by using the Stray Animal Complaint System mobile application.…”
    Get full text
    Get full text
    Get full text
    Book Section
  13. 13

    Design of an advanced encryption standard crypto-processor core for field programmable gate array implementation by Ismail, Mohd. Izuan

    Published 2006
    “…The advances in reconfigurable hardware create the possibility of developing a microchip with application-specific processors. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Design and implementation of security solution for M-government on mobile platforms using hybrid of NTRU-PKI and aes-rijndael by Tawfeeq M.A., Sultan M.T.

    Published 2023
    “…In this research, the authors proposes a system technique to secure the transmission of the m-Government using hybrid security algorithms of AES-Rijndael and NTRU, with concentration on confidentiality and authentication as core services in m-Government current transactions, in order to enhance the security of transmission medium and achieve better security of m-Government services. …”
    Article
  15. 15

    Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms by Hydara, Isatou

    Published 2024
    “…This new improved approach is significant in helping web application developers to test their applications for all types of XSS and remove any detected vulnerabilities before releasing them to the public. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael by Al-Bakri, S.H., Mat Kiah, M.L.

    Published 2010
    “…The developed application is tested on real equipment such as a Nokia N70. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Routing A ware Distributed Service Discovery Architecture with Intelligent Message Routing by HAJA NAZMUDEEN, MOHAMED SALEEM

    Published 2012
    “…A suitable query routing algorithm was developed and tested with the DSD architecture.…”
    Get full text
    Get full text
    Thesis
  20. 20

    Real time traceability module for halal logistic transportation using GPS and geofence technique by Mohamad, Maizatul Akma

    Published 2016
    “…A comparison of performance and result of the geofence technique and Family Locator application, developed by Sygic, was made. A user acceptance test has been implemented and most of the respondents agreed that this module will benefit the Halal logistic provider in providing data on real time traceability. …”
    Get full text
    Get full text
    Thesis