Search Results - (( developing information toward algorithm ) OR ( java implication research algorithm ))
Search alternatives:
- developing information »
- implication research »
- information toward »
- research algorithm »
- toward algorithm »
- java implication »
-
1
Range sensor based local path planning algorithm for mobile robot in unknown static environment with beacon / Wan Ahmad Jailani Wan Ngah
Published 2013“…The Bug algorithm is a local path planning methodology for mobile robot which detects the nearest obstacle as the robot moves towards a target with no or very limited information about the environment. …”
Get full text
Get full text
Thesis -
2
Development of coordinating algorithm for rendezvous task of mobile robots
Published 2023“…To accomplish this task, a coordinating algorithm was developed that allows the robots to work together in a distributed manner. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Towards optimal search: a modified secant method for efficient search in a big database
Published 2018Get full text
Get full text
Conference or Workshop Item -
4
Application Of Exact String Matching Algorithms Towards SMILES Representation Of Chemical Structure.
Published 2007Get full text
Get full text
Conference or Workshop Item -
5
-
6
Influence maximisation towards target users and minimal diffusion of information based on information needs
Published 2020“…This study proposes the Information Diffusion towards Target Users (IDTU) algorithm to enhance influencer selection while minimizing the DC. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
-
8
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
9
-
10
Iteration strategy and ts effect towards the performance of population based metaheuristics
Published 2020“…A researcher developing a new population-based algorithm need to identify the best strategy so that the performance of the algorithm proposed is maximized.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
A block cipher based on genetic algorithm
Published 2016“…Other than that, the evolvement of technology will also contribute towards the development of new block ciphers. To satisfy the information security requirements and to enhance the information security, we need secured communication and data which can be attained by encrypting the data. …”
Get full text
Get full text
Get full text
Thesis -
12
What drives Chinese youth to use fitness-related health information on social media? an analysis of intrinsic needs, social media algorithms, and source credibility
Published 2024“…Discussion: These findings provide new insights into developing health communication strategies on social media, particularly targeted toward the youth demographic, enhancing our understanding of effective health information dissemination in digital environments.…”
Get full text
Get full text
Get full text
Article -
13
Agro-ento bioinformation: towards the edge of reality
Published 2002Get full text
Get full text
Inaugural Lecture -
14
Static image of hand gesture for numerical sign language recognition system using backfrofagation neural network / Erman Ibrahim
Published 2007“…The usefiil information can be used as a basic idea towards project methodology whereby a detail development process presented. …”
Get full text
Thesis -
15
Haptic Texture Search Engine Framework
Published 2010“…This paper describes how both CV and CH could be applied into our proposed search engine framework for searching fabric textures. The framework developed involves a computer vision algorithm and a haptic rendering algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Lattice-based cryptography: the dots that provide information security
Published 2023“…Since the novel discovery of Shor’s quantum algorithm, current interest in cryptography is moving towards a new direction called Post-Quantum Cryptography. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
17
Securing password authentication using MD5 algorithm
Published 2014“…Apart from protection, a step toward perfect security has taken by using MD5 algorithm…”
Get full text
Get full text
Undergraduates Project Papers -
18
-
19
High Rise Building Evacuation Route Model Using DIJKSTRA'S Algorithm
Published 2015“…The main algorithms involve is Dijkstra’s algorithm and then an Ant Colony Optimization algorithm is used as hybrid versions of Dijkstra’s algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Integrating of web 2.0 technologies for interactive courseware : data structure and algorithm as case study
Published 2013“…The intention of the developed courseware is not to replace conventional class, but the develop courseware main objective is to assist students of FCSIT for better understanding towards Data Structure and Algorithms Course (TMC1433) through interactive delivering information.…”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD
