Search Results - (( developing modern methods algorithm ) OR ( java application modified algorithm ))

Refine Results
  1. 1
  2. 2

    A comprehensive overview of classical and modern route planning algorithms for self-driving mobile robots by Wan Daud, Wan Mohd Bukhari, Abu, Nur Syuhadah, Omar, Siti Nashayu, Sohaimeh, Shahirul Ashraf, Adli,, M. H.

    Published 2022
    “…Classical or traditional methods, such as Roadmaps (Visibility Graph and Voronoi Diagram), Potential Fields, and Cell Decomposition, and modern methodologies such as heuristic-based (Dijkstra Method, A* Algorithms, and D* Algorithms), metaheuristics algorithms (such as PSO, Bat Algorithm, ACO, and Genetic Algorithm), and neural systems such as fuzzy neural networks or fuzzy logic (FL) and Artificial Neural Networks (ANN) are described in this report. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    An approximation approach for free space wave propagation by Hasan, Mohammad Khatim, Sulaiman, Jumat, Othman, Mohamed

    Published 2009
    “…Numerical method accelerates and facilitates research and development in the fields. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9
  10. 10

    Intelligent energy systems using the barnacles mating optimizer and evolutionary mating algorithm: Foundations, methods, and applications by Mohd Herwan, Sulaiman, Zuriani, Mustaffa

    Published 2026
    “…Intelligent Energy Systems using the Barnacles Mating Optimizer and Evolutionary Mating Algorithm: Foundations, Methods, and Applications reveals the potential of innovative optimization algorithms to support sustainability in modern energy systems. …”
    Get full text
    Get full text
    Get full text
    Book
  11. 11

    Old Jawi manuscript: Digital recognition / Zaidi Razak by Zaidi, Razak

    Published 2016
    “…This research did not use artificial intelligence techniques to achieve the research goal. The algorithms developed in this research were evaluated against similar algorithms for other recognition methods. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Scan Matching and KNN Classification for Mobile Robot Localisation Algorithm by Addie Irawan, Hashim, Marni Azira, Markom, Abdul Hamid, Adom, Mohd Muslim Tan, E. S.

    Published 2017
    “…The mobile robot and the developed algorithm are tested in static environment. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Enhanced scalar multiplication algorithm over prime field using elliptic net by Muslim, Norliana, Yunos, Faridah, Razali, Zuren, Norddin, Nur Idalisa

    Published 2024
    “…At the field operational level, in comparison to the binary method, the eight-block elliptic net method, and the elliptic net method with ten temporary variables for the 384 bits scenario, the developed scalar multiplication algorithm obtained cost reductions of 57.6%, 31.3%, and 13.2%, respectively. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    DATA ANALYTICS FOR HOSPITAL OPERATIONS by EL SAFTY, ABDULRAHMAN EHAB

    Published 2015
    “…Throughout the years, research has been concluded to develop methods of interpreting and analyzing this data. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…The proposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Utility-based non-cooperative power control game in wireless environment / Yousef Ali Mohammed Al-Gumaei by Yousef Ali, Mohammed Al-Gumaei

    Published 2017
    “…Novel utility and cost functions proposed in this work are the method to derive efficient distributed power control algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…The purposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Optimizing wireless sensor networks: A survey of clustering strategies and algorithms by Hamim, Sakib Iqram, Azamuddin, Ab Rahman

    Published 2024
    “…This study serves as a helpful source of knowledge that can encourage the further development of the enhancement of clustering algorithms for WSNs in response to modern technology needs.…”
    Get full text
    Get full text
    Get full text
    Article