Search Results - (( developing nation using algorithm ) OR ( java implementation during algorithm ))
Search alternatives:
- implementation during »
- java implementation »
- during algorithm »
- using algorithm »
- nation using »
-
1
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
3
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
4
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Data Hiding Techniques In Digital Images
Published 2003“…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
Get full text
Get full text
Thesis -
6
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. The proposed system is then designed and developed using Java programming language. …”
Get full text
Get full text
Thesis -
7
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
8
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
9
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To prevent overfitting, early stopping is used to monitor validation loss during training and dropout rate of 0.3 are applied. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Automated tournament management system with dynamic matchmaking using genetic algorithm / Wan Muhammad Aqil Wan Harun
Published 2016“…Actives such as observation, interview and questionnaire has been done to gather the requirements for developing the system. CTMS are embedded with dynamic match making using genetic algorithm that can pairs players based on variation combination of criteria such as player’s gender, points and nation. …”
Get full text
Get full text
Thesis -
11
Designing and Developing an Intelligent Congkak
Published 2011“…and “Can Min-Max algorithm (MM) be speeded up by using NN as a forward-pruning method?”. …”
Get full text
Get full text
Get full text
Thesis -
12
A new 128-bit block cipher
Published 2009“…The existence of this new 128-bit block cipher algorithm will increase the protection of the national information infrastructure and also will contribute as an alternative to other cryptographic algorithms in security in the computing industry.…”
Get full text
Get full text
Thesis -
13
CAR LICENSE PLATE RECOGNITION BY USING TEMPLATE MATCHING ALGORITHM
Published 2015Get full text
Get full text
Proceeding -
14
Optimal charging strategy for plug-in hybrid electric vehicle using evolutionary algorithm
Published 2016“…An optimal charging strategy for plug-in hybrid electric vehicle (PHEV) is proposed and developed by using evolutionary algorithm to obtain the most suitable charging condition for each PHEV charging. …”
Get full text
Get full text
Undergraduates Project Papers -
15
-
16
Develpoment of combinatorial optimisation for cutting tool path strategy
Published 2009Get full text
Get full text
Conference or Workshop Item -
17
Genetic Algorithm for Forecasting Bioinformatic Outcomes of Mutation-induced Cowpeas for Sustainable Development
Published 2023“…The aim of this work is to address malnutrition, immune deficiency, hunger, and poverty as canvassed in United Nations Sustainable Development Goals 1 and 2 (SDGs 1 and 2). …”
Get full text
Get full text
Get full text
Article -
18
Secure mobile AES encryptor (SMAE)
Published 2016“…The purpose of this project is to identify a way to develop a mobile web application for the encryption and decryption of files using the 256 –bit Advanced Encryption Standard (AES) encryption algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
19
-
20
Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method
Published 2020“…This algorithm is generally used to validate identification numbers such as IMEI, debit/credit card numbers, social security numbers, national identification numbers etc. …”
Get full text
Get full text
Journal
