Search Results - (( developing mobile efficient algorithm ) OR ( java detection using algorithm ))
Search alternatives:
- mobile efficient »
- using algorithm »
- java detection »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
3
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Detection and extraction features for signatures images via different techniques
Published 2019Get full text
Get full text
Conference or Workshop Item -
5
Development of coordinating algorithm for rendezvous task of mobile robots
Published 2023“…Overall, the proposed algorithm provides an efficient solution for the coordination of mobile robots in the rendezvous task, where the algorithm is capable of handling different group scenarios and is coordinate-free. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Smart and energy aware routing for the internet of mobile things
Published 2021“…Therefore, a smart and energy efficient routing algorithm is necessary to be developed and the level of energy consumption is important to be improved and observed. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Identification of microcalcification in mammographic images / Noor Azliza Abdul Shauti
Published 2008“…By using this identification, it can simulate in flexible images post processing and analysis in easy image management using Java aplication. …”
Get full text
Get full text
Thesis -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
Get full text
Get full text
Thesis -
9
Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff
Published 2017“…This thesis proposed an efficient algorithm, namely, the Quality of Service (QoS) and Energy Efficient Aware (QEEA). …”
Get full text
Get full text
Thesis -
10
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article -
11
Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff
Published 2018“…This thesis proposed an efficient algorithm, namely, the Quality of Service (QoS) and Energy Efficient Aware (QEEA). …”
Get full text
Get full text
Book Section -
12
Improved autonomous charging of mobile multi-robots using honeybee-inspired algorithm
Published 2016“…The dynamic threshold of remaining energy was activated when the mobile robot has knowledge of charging station. The improved honeybee inspired algorithm showed that the mobile robot could increase working time efficiency from 37% to 95%. …”
Get full text
Get full text
Thesis -
13
Text steganalysis using evolution algorithm approach
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
15
Efficient and stable routing algorithm based on user mobility and node density in urban vehicular network
Published 2016“…Therefore, this paper proposes a novel routing algorithm called efficient and stable routing algorithm based on user mobility and node density (ESRA-MD). …”
Get full text
Get full text
Article -
16
-
17
Development of behavior-based reactive navigation system for mobile robot
Published 2013“…To solve the problems and achieve the above objective, a new behavior-based reactive navigation system for mobile robots is developed. The motions of Pioneer 3TM mobile robot were simulated to show the developed algorithm performance. …”
Get full text
Get full text
Thesis -
18
Augmented Reality Framework For Symbian Mobile Devices
Published 2013“…To make the development of AR application for mobile device more efficient, an Augmented Reality framework is developed in this research. …”
Get full text
Get full text
Thesis -
19
Designing and implementation of robot mapping algorithm for mobile robot
Published 2014Get full text
Get full text
Get full text
Proceeding Paper -
20
Wireless sensor nodes deployment using multi-robot based on improved spanning tree algorithm
Published 2015“…One of the solutions to this problem is by using mobile robots with concern on exploration algorithm for mobile robot. …”
Get full text
Get full text
Thesis
