Search Results - (( developing users connection algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Second Level Password Generator by Tay, Choo Chuan, Sakidin, Hamzah, Herman, Nanna Suryana, Baharon, Mohd Rizuan

    Published 2010
    “…Every time the user connects, he or she must provide the magic word; he must prove he is who he says he is. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    UiTM Malaysia route planner / Mohamad Yunus Mohamed Nasir by Mohamed Nasir, Mohamad Yunus

    Published 2008
    “…The objectives of this research/project are to provide information and guidance for users to find shortest path from familiar point or places to main entrance UiTM Malaysia by using car, to provide an approximation of the shortest distance between source and destination using Dijkstra's algorithm and to develop web based system UiTM Malaysia Route Planner for users who is familiar in Shah Alam.…”
    Get full text
    Get full text
    Thesis
  6. 6

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  7. 7

    A Web-Based Recommendation System To Predict User Movements Through Web Usage Mining by Jalali, Mehrdad

    Published 2009
    “…Moreover, navigation pattern mining has been done by finding connected components in the graph. In the online phase, the longest common subsequence algorithm is used as a new approach in recommendation system for classifying current user activities to predict user next movements. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…The main objectives for this project are focusing on the development of user interface that can connect with the machine learning build in Microsoft Azure for pump diagnostic purpose. …”
    Get full text
    Get full text
    Monograph
  9. 9

    Efficient and stable routing algorithm based on user mobility and node density in urban vehicular network by Al-Mayouf, Y.R.B., Ismail, M., Abdullah, N.F., Wahab, A.W.A., Mahdi, O.A., Khan, S., Choo, R.K.K.

    Published 2016
    “…An appropriate, efficient, and stable routing algorithm must be developed for various VANET applications to address the issues of dynamic topology and intermittent connectivity. …”
    Get full text
    Get full text
    Article
  10. 10

    Quality of service management algorithms in WiMAX networks by Saidu, Ibrahim

    Published 2015
    “…Simulation have been extensively used to evaluate the proposed algorithm. Finally, Discrete Event Simulator (DES) is designed and developed in order to evaluate the performance of the proposed algorithms. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Joint optimization of resources allocation for quality of service aware next-generation heterogeneous cellular networks / Hayder Faeq Rasool Alhashimi by Hayder Faeq Rasool , Alhashimi

    Published 2025
    “…First, a greedy-based user association algorithm is proposed to allocate multiple users to MBS or SBSs to maximize the total sum rate. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Quality of service and scheduling performance optimization in LTE networks / Abubakar Auwal Idris by Abubakar Auwal , Idris

    Published 2017
    “…The developed scheduling algorithm is accomplished in three methodological stages as follows: first, frequency domain was considered for efficient scheduling at Resource Blocks (RBs) to the users based on best Channel Quality Indicator (CQI) report send from mobile station called as User Equipment (UE) to the base station (eNodeB). …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Characterization of Internet Traffic in UUM Wireless Networks by Abdullah, Wisam Dawood

    Published 2012
    “…Whereas, the growth of the wireless network with additional mobile devices in the UUM and increasing number of users led to slow wireless connection. Therefore, understanding the behavior of traffic analysis helps us to develop, manage WLAN technology, and deploy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Smart IoT energy optimisation and localisation monitoring for e-bike sharing by Mohamed, Mawada Ahmed, Toha, Siti Fauziah, Rahman, Md Ataur, Khairudin, Moh.

    Published 2025
    “…The methodology involved integrating sensors to collect key data, implementing connectivity for real-time monitoring, and developing an energy optimization algorithm to prolong battery life, improving the efficiency of the e-bike sharing system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Improving Adaptive Quality of Service for Multimedia Wireless Networks Using Hierarchical Networks Approach by Kandasamy, Saravanan

    Published 2004
    “…The key feature of this framework is the integration of the hierarchical network together with the modified Call Admission Control (CAC) algorithm and the bandwidth reallocation scheme. These schemes are developed to control the bandwidth operation of ongoing connections when the system is overloaded depending on the movement speed of a particular user assuming the speed of a mobile user would not be changed throughout the duration of a connection. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19
  20. 20

    Parameter estimation of multivariable system using Fuzzy State Space Algorithm / Razidah Ismail … [et al.] by Ismail, Razidah, Ahmad, Tahir, Harish, Noor Ainy, A. Halim, Rosenah

    Published 2011
    “…The initial phase involved the development of the FSSM of the superheater system. In order to enhance the implementation of the algorithm, it is necesssary to develop an efficient computation program together with the user's interface. …”
    Get full text
    Get full text
    Research Reports