Search Results - (( developing reading process algorithm ) OR ( java validation using algorithm ))
Search alternatives:
- process algorithm »
- validation using »
- reading process »
- java validation »
- using algorithm »
-
1
-
2
Missing tags detection algorithm for radio frequency identification (RFID) data stream
Published 2019“…In fact, the performance of RFID missing tag detection is largely affected by uncertainty, which should be considered in the detecting process phase to minimize its negative impact. Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
4
-
5
Automation of Quranic Readings Gathering Process
Published 2021“…To the best of the author's knowledge, no computational automation has been cited for this process in literature. In this paper, this process was algorithmically formulated and a developed software system was presented to automate this process. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
7
Development of Digital Image Processing Algorithms via FPGA Implementation
Published 2024“…Several digital image processing algorithms have been developed in this project, which are gray level transformation, brightness manipulation, contrast adjustment, thresholding, and inversion. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
9
Iot health monitoring system for self quarantined covid-19 patients
Published 2022“…Then to get the temperature reading we use some algorithm to calculate the temperature reading from sensor. …”
Get full text
Get full text
Undergraduates Project Papers -
10
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Development of mobile robot and localization system
Published 2014“…Thus, the research involves designing an indoor mobile robot and creating algorithm for the mobile robot to localize. As such, the purpose of this thesis is to develop the localization of the mobile robot based on Extended Kalman Filter (EKF) method. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Development Of The Readability Index Model For Young Adults With Reading Difficulties In Malay Language
Published 2019“…This tool will increase the accuracies in measuring reading competencies among young adults, and will be able to help the dyslexic users with reading difficulties in knowing the level of readability of each reading materials.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
CSC734 - Readings in Computer Science / College of Computing, Informatics and Media
Published 2022Get full text
Get full text
Get full text
Teaching Resource -
14
CSC734: Readings in Computer Science / College of Computing, Informatics and Mathematics
Published 2018Get full text
Get full text
Get full text
Teaching Resource -
15
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
16
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In order to develop an intelligent agent, various programming techniques are used in achieving the property of self learning, information retrieval and searching algorithm. …”
Get full text
Get full text
Thesis -
17
Surface defect detection and polishing parameter optimization using image processing for G3141 cold rolled steel
Published 2016“…To realize this, automatic cropping algorithm is developed to detect the region of interest and interpret the Ga value. …”
Get full text
Get full text
Thesis -
18
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
19
Online teleoperation of writing manipulator through graphics processing unit based accelerated stereo vision
Published 2021“…The proposed algorithms aim to accelerate the processes of distortion removal and rectification using precomputed combined maps. …”
Get full text
Get full text
Thesis -
20
Design of DNA fragment assembly using IWP method on application-specific integrated-circuit / Hasniliati Hassan
Published 2017“…In recent years, many software programs have been developed in order to improve the assembly process. …”
Get full text
Get full text
Thesis
