Search Results - (( developing modern method algorithm ) OR ( java application path algorithm ))

Refine Results
  1. 1

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    A comprehensive overview of classical and modern route planning algorithms for self-driving mobile robots by Wan Daud, Wan Mohd Bukhari, Abu, Nur Syuhadah, Omar, Siti Nashayu, Sohaimeh, Shahirul Ashraf, Adli,, M. H.

    Published 2022
    “…Classical or traditional methods, such as Roadmaps (Visibility Graph and Voronoi Diagram), Potential Fields, and Cell Decomposition, and modern methodologies such as heuristic-based (Dijkstra Method, A* Algorithms, and D* Algorithms), metaheuristics algorithms (such as PSO, Bat Algorithm, ACO, and Genetic Algorithm), and neural systems such as fuzzy neural networks or fuzzy logic (FL) and Artificial Neural Networks (ANN) are described in this report. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    An approximation approach for free space wave propagation by Hasan, Mohammad Khatim, Sulaiman, Jumat, Othman, Mohamed

    Published 2009
    “…Numerical method accelerates and facilitates research and development in the fields. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8
  9. 9

    Intelligent energy systems using the barnacles mating optimizer and evolutionary mating algorithm: Foundations, methods, and applications by Mohd Herwan, Sulaiman, Zuriani, Mustaffa

    Published 2026
    “…Intelligent Energy Systems using the Barnacles Mating Optimizer and Evolutionary Mating Algorithm: Foundations, Methods, and Applications reveals the potential of innovative optimization algorithms to support sustainability in modern energy systems. …”
    Get full text
    Get full text
    Get full text
    Book
  10. 10

    Old Jawi manuscript: Digital recognition / Zaidi Razak by Zaidi, Razak

    Published 2016
    “…This research did not use artificial intelligence techniques to achieve the research goal. The algorithms developed in this research were evaluated against similar algorithms for other recognition methods. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Scan Matching and KNN Classification for Mobile Robot Localisation Algorithm by Addie Irawan, Hashim, Marni Azira, Markom, Abdul Hamid, Adom, Mohd Muslim Tan, E. S.

    Published 2017
    “…The mobile robot and the developed algorithm are tested in static environment. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Enhanced scalar multiplication algorithm over prime field using elliptic net by Muslim, Norliana, Yunos, Faridah, Razali, Zuren, Norddin, Nur Idalisa

    Published 2024
    “…At the field operational level, in comparison to the binary method, the eight-block elliptic net method, and the elliptic net method with ten temporary variables for the 384 bits scenario, the developed scalar multiplication algorithm obtained cost reductions of 57.6%, 31.3%, and 13.2%, respectively. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    DATA ANALYTICS FOR HOSPITAL OPERATIONS by EL SAFTY, ABDULRAHMAN EHAB

    Published 2015
    “…Throughout the years, research has been concluded to develop methods of interpreting and analyzing this data. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…The proposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Utility-based non-cooperative power control game in wireless environment / Yousef Ali Mohammed Al-Gumaei by Yousef Ali, Mohammed Al-Gumaei

    Published 2017
    “…Novel utility and cost functions proposed in this work are the method to derive efficient distributed power control algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…The purposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Optimizing wireless sensor networks: A survey of clustering strategies and algorithms by Hamim, Sakib Iqram, Azamuddin, Ab Rahman

    Published 2024
    “…This study serves as a helpful source of knowledge that can encourage the further development of the enhancement of clustering algorithms for WSNs in response to modern technology needs.…”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Improved scalar multiplication algorithm in affine coordinate system using elliptic net by Razali, Zuren, Muslim, Norliana, Kahar, Saliyah, Yunos, Faridah, Mohamed, Kamsiah

    Published 2022
    “…In the case of the 384-bits, results indicate that the developed scalar multiplication algorithm accelerates the running time by 65.96 % compared to the binary method, 44.81 % compared to the elliptic net without equivalent sequences, 30.28 % compared to the elliptic net with temporary variables, and 19.71 % compared to the seven blocks of the elliptic net with Karatsuba method. …”
    Get full text
    Get full text
    Get full text
    Article