Search Results - (( developing special visualization algorithm ) OR ( java implementation path algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Visual Public-Key Cryptosystems. by Samsudin, Azman

    Published 2012
    “…Until recently, building a highly secured public-key cryptosystem without utilizing complex computations has been a serious challenge, making it necessary for investigations to develop new cryptography methods. Visual cryptography is special because the scheme requires visual inspection or the equivalence of simple Boolean computation and therefore, does not require complex computations.…”
    Get full text
    Get full text
    Monograph
  6. 6

    The Development of Color Based Visual Search Utility by Mohamed, Al Mabruk S.

    Published 2001
    “…Secondly, the color algorithm was developed to interpret natural expressions of content such as 10%, 20%, etc. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations by Jaafar, Abdullah Mohammed Abdo Ali

    Published 2011
    “…Until recently, building a highly secured public-key cryptosystem without utilizing complex computations has been a serious challenge, making it necessary for investigations to develop new cryptography methods. Visual cryptography is special because the scheme requires visual inspection or the equivalence of simple Boolean computation and therefore, does not require complex computations. …”
    Get full text
    Get full text
    Thesis
  8. 8

    The Development Of Planar Curves With High Aesthetic Value by Rudrusamy, Gobithaasan

    Published 2010
    “…The pattern of research in this ¯eld of study has branched to ¯ve major groups; the devel- opment of fairing algorithms; the development of planar curves via curve synthesis, the development of algorithms to modify natural spirals to suit design intent, the modi¯cation of °exible curves (B¶ezier and NURBS) so that the curvature pro¯le is strictly monotonic and ¯nally, the development of algorithms to ¯t natural spirals and approximation via °exible curves.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Image storage and retrieval using color quantization method by Mandal, Koushik Kanti, Islam, Md. Rafiqul, Md. Sap, Mohd. Noor, Khatun, Fahmida, Reza, Md. Parvez

    Published 2005
    “…The image is segmented by our proposed segmentation algorithm, which uses the compact color descriptor .The result of the experiment shows that the developed segmentation algorithm produces better performances as compared with the existing segmentation algorithm. …”
    Get full text
    Get full text
    Article
  10. 10

    Tumor Extraction for Brain Magnetic Resonance Imaging Using Modified Gaussian Distribution by Salih Al-Badri, Qussay Abbas

    Published 2006
    “…The mutual information algorithms used in this work has been developed and experimented in the system and has proven to yield more accurate and stable results than other algorithms. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Parallel computation of maass cusp forms using mathematica by Chan, Kar Tim

    Published 2013
    “…Our parallel programme comprises of two important parts namely the pullback algorithm and also the Maass cusp form algorithm. The latter is developed using an adapted algorithm of Hejhal and Then which is based on implicit automorphy and finite Fourier series. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Clustering autism spectrum disorder student’s system based on intelligence, skills and behavior using agglomerative clustering algortihm / Daarin Nadia Nordin by Nordin, Daarin Nadia

    Published 2020
    “…Another feature that the CASDSS offers is visualization where the system is able to visualize the clustering results as well as the strengths and weaknesses of the ASD students. 80 data regarding the autistic student’s behaviour, intelligence and skills are collected from special schools through distribution of questionnaires. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Design And Evaluation Of A Modified Csma/Cd Mac Protocol On Single-Channel Optical Local Area Network by Khairi, Kharina

    Published 2003
    “…The algorithm was developed in Visual Basic 6.0v programming language. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Development of IoT-based automated dynamic emergency response system against fire incidents in academic building by Al-Hady, Syed Mohammed Zakaria, Islam, Md Rafiqul, Rashid, Muhammad Mahbubur

    Published 2023
    “…The ongoing advancement of architectural and structural designs, high-ceiling spaces, special spaces have made fire disasters increasingly diverse and difficult to predict. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Website assurance monitoring application with MD5 Hashing and SHA-26 Algorithm / Abdullah Sani Abd Rahman and Samsiah Ahmad by Abd Rahman, Abdullah Sani, Ahmad, Samsiah

    Published 2022
    “…The Website Assurance Monitoring application has been developed based on MD5 hashing technique and SHA26 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20