Search Results - (( developing using three algorithm ) OR ( java applications usage algorithm ))

Refine Results
  1. 1

    An Effective Fast Searching Algorithm for Internet Crawling Usage by Chia, Zhen Hon, Nor Azhar, Ahmad

    Published 2016
    “…The search algorithm is a crucial part in any internet applications. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…The experimental result shows that using Java 2, this method improves the speed of PrefixSpan up to almost two orders of magnitude as well as the memory usage to more than one order of magnitude.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Stereolithography 3D printing development of 3D printing machine controller using the predefined closest-distance volume interpolator system by -, -

    Published 2019
    “…Recent advancement in 3D printing technology has led to the development of projection mask stereolithography 3D printing process. …”
    Get full text
    Get full text
    Research Report
  5. 5

    The Development Of A Robust Algorithm For Uav Path Planning In 3d Environment by Kok, Kai Yit

    Published 2016
    “…Thus, a new algorithm known as infection evolution (IE) was developed in this study. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Magnetic attitude control options for earth pointing small satellite by Mohd Suhadis, Nurulasikin

    Published 2011
    “…The developed control algorithms are modeled using the MATLAB SIMULINK codes. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence by S. S. S. , Ranjit

    Published 2011
    “…In addition, the mentioned block-matching algorithms are the baseline techniques that have been used to further develop all the enhanced or improved algorithms. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  8. 8

    Development of obstable avoidance system for 3D robot navigation by Er, Kai Sheng

    Published 2024
    “…In this project, an algorithm was developed to implement an obstacle avoidance system in 3D robot navigation. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Path planning for unmanned aerial vehicles using visibility line-based methods by Omar, Rosli

    Published 2011
    “…In addition, a software package using Matlab for 2D and 3D path planning has also been developed. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Encrypted email using 3D AES block cipher algorithm / Khairah Mohd Wi by Mohd Wi, Khairah

    Published 2015
    “…Encrypted email is addition mail that comes up with prototype application called,3D-AES block cipher. There are three objective designed: To identify an encrypted email application development of 3D AES block cipher algorithm and hash process, to develop encrypted email using 3D AES process on email and lastly to measure the validity of the encrypted & decrypted email message by comparing the hash value generate before encrypt and after decrypt. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Shunt active power filter using hybrid fuzzy-proportional and crisp-integral control algorithms for total harmonic distortion improvement by Abdul Rahman, Nor Farahaida

    Published 2016
    “…Hence, this complicated structure and operation will affect the capability of SAPFs to work efficiently.Therefore, this work proposes three soft-computing algorithms for generating reference currents, and controlling current and voltage of a three-phase three-leg three-wire SAPF. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Mathematical models and optimization algorithms for low-carbon Location-Inventory-Routing Problem with uncertainty by Liu, Lihua

    Published 2024
    “…Given the NP-Hard nature of the three models proposed in this thesis, two metaheuristic algorithms have been developed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Flowshop scheduling using artificial bee colony (ABC) algorithm with varying onlooker bees approaches by Mohd Pauzi, Nur Fazlinda

    Published 2015
    “…The research also analyzes the performance of the ABC algorithm using three different onlooker bee approaches. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Compressing Images Using Multi-Level Wavelet Transform Algorithm (MWTA) by Odeh, Ali Ahmad Alabd Abu

    Published 2012
    “…Multi-levels were used in this study with the aim to produce better results for compressing images.The Multi-level Wavelet Transform Algorithm (MWTA) consists of three phases namely, first level compression, second level compressing in the first level, and algorithm validation by compare.Therefore, Vaishnavi method is used to design and develop the prototype model.In this study, the experiment was conducted using different images (RGB). …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube by Mushtaq, Muhammad Faheem

    Published 2019
    “…By using the three-dimensional hybrid cube in KSAHC transformation, encryption keys are represented as n × n × n matrix of integer numbers and used in the development of the permutation and substitution of order 4 square matrix. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Enhanced control algorithms for multilevel inverter-based shunt active power filter by Hoon, Yap

    Published 2017
    “…Finally, mitigation performance of the three-level NPC inverter-based SAPF while using all the proposed control algorithms simultaneously (Set 3) is observed to be the best.…”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Audio encryption and decryption using 3D AES block cipher algorithm / Nur Fattin Nadhrah Saifuddin by Saifuddin, Nur Fattin Nadhrah

    Published 2018
    “…This project purpose is to identify the implementation testing security using 3D AES block cipher algorithm. Besides, this encryption using audio as a data in order to design and develop the project. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Tag clouds algorithm with the inclusion of personality traits by Ahmad Affandi, Supli

    Published 2015
    “…The algorithm was developed based on three theories of personality traits, namely Myers-Briggs Type Indicator (MBTI), Shape, and Multiple Intelligence (MI). …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20