Search Results - (( developing implementation using algorithm ) OR ( service application using algorithm ))

Refine Results
  1. 1

    Development Of Motion Planer And Navigation System For An Office Assistant Robot by Looi, Chen Zheng

    Published 2021
    “…Robot Operating System (ROS) is one of the common platforms to developed these robots. Besides, map was generated by using SLAM algorithm, the costmap was setup and the parameters such as inflation_dist and cost_scaling_factor was studied and tuned based on this application. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Dynamic Feedback Flow Control Algorithms for Unicast and Multicast Available Bit Rate Service in Asynchronous Transfer Mode Networks by Abdelrahman, Ali Mohamed

    Published 2000
    “…In particular, the ABR service has been approved to use the bandwidth left by CBR and VBR services, which is ideal for data applications and can perform well for real-time applications with the appropriate implementation. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment by Perumal, Thinagaran

    Published 2011
    “…Besides, this algorithm provides home users or application developers to implement their own event operators with bespoke syntax for their application purpose by defining cross-events corresponding to the event operators. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks by Mohamed, Mohamed Awad Elshaikh

    Published 2006
    “…The interaction of different traffic type flows in a DiffServ networks using the proposed integration model between FWFQ and the dual token bucket shaper algorithm is analyzed. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Sentiment analysis on airline reviews using Naive Bayes / Nurul Sarah Aliessa Che Harun by Che Harun, Nurul Sarah Aliessa

    Published 2025
    “…In the design and implementation phases, TF-IDF was considered in cleaning and preparing the reviews for application, while the construction of a sentiment analysis model was implemented through the use of the Multinomial Naive Bayes algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    The Determination of Pile Capacity Using Artificial Neural-net: An Optimization Approach by Ab. Malik, Rosely, Jamil S., Mohamed

    Published 2001
    “…Using the developed algorithm, the safety measures involved are such as reliability index and the probability of failure; instead of only factor of safety if conventional deterministic approach is used. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Traffic management algorithms for LEO satellite networks by Huyop @ Ayop, Fahrul Hakim

    Published 2016
    “…Overall, from all the three experiments that have been conducted, the proposed routing algorithms which have been developed to manage the network traffic have proved better than the previously developed algorithms in several perspectives especially for the implementation of real-time applications in LEO satellite networks.…”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is developed using Software Development Life Cycle (SDLC), supported by Unified Modeling Language (UML) for the design. …”
    Get full text
    Get full text
    Get full text
    Monograph
  11. 11

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  12. 12

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  13. 13

    Car dealership web application by Yap, Jheng Khin

    Published 2022
    “…The used car dealership web application was implemented with ASP.NET Core. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    Simulation Of Token Bucket Algorithm For Network Traffic Performance by Yusof, Robiah, Mat Nawi, Nor Afifah

    Published 2020
    “…The variables of this algorithm are modified in order to offer the effective proposed token bucket size that can be used in wired network and tested using OPNET modeler. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems by Paniandi, Arul

    Published 2006
    “…The computation intensive modular multiplication operation is based on the Montgomery’s algorithm and implemented using systolic array architecture. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari by Nazari, Khairul Nashran

    Published 2017
    “…The distribution using online services will cut the cost of distributing and communications in the organizations. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Development of a wireless mesh network routing algorithm for oil and gas pipeline networks by Azman, Amierul Syazrul Azril

    Published 2021
    “…The improvement on packet delivery ratio using OEG algorithm has satisfied the benchmark of packet delivery ratio used by the other researchers for industrial applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The project objectives includes:(i) To investigate lightweight message encryption algorithms by benchmarking their efficiency in terms of computation speed and generated cipher text size; (ii) To design and develop the TalkOut mobile application with lightweight message encryption by using prototype software development model.; and (iii) To evaluate the usability performance of the developed proposed TalkOut mobile application using System Usability Scale (SUS) approach. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  20. 20

    Kernel and multi-class classifiers for multi-floor wlan localisation by Abd Rahman, Mohd Amiruddin

    Published 2016
    “…The multi-class classification strategy is used to ensure quick estimation of the multi-class NN algorithms. …”
    Get full text
    Get full text
    Thesis