Search Results - (( development planning visualization algorithm ) OR ( java data function algorithm ))

Refine Results
  1. 1

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    The Development Of A Robust Algorithm For Uav Path Planning In 3d Environment by Kok, Kai Yit

    Published 2016
    “…Thus, a new algorithm known as infection evolution (IE) was developed in this study. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for visually impaired people in an unfamiliar environment using particle swarm optimization by Yusof, T. S. T., Toha, Siti Fauziah, Md. Yusof, Hazlina

    Published 2015
    “…Here, in this paper, we propose a path planning with predetermined waypoints method using Particle Swarm Optimization (PSO) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Performance Study of Developed SMART EYE for Visually Impaired Person. by Anuar , Mohamed Kassim, Shukor, Ahmad Zaki

    Published 2013
    “…Path planning algorithm will be implemented in this project to give the shortest path and direction as a navigation guide for visually impaired people. …”
    Get full text
    Get full text
    Article
  6. 6

    Development of task distribution algorithm for multi-robot coordination system by Sin, Han Bin

    Published 2022
    “…Algorithms are integrated with RMF for task distribution and path planning for the robots. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Exploratory Study on Navigation System for Visually Impaired Person by Anuar , Mohamed Kassim, Shukor, Ahmad Zaki

    Published 2013
    “…Path planning algorithm will be implemented in this project to give the shortest path and direction as a navigation guide for visually impaired people. …”
    Get full text
    Get full text
    Article
  8. 8

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…This report details the development of an autonomous guide robot system for visually impaired individuals using the ROS 2 framework and the Wheeltec R550 Robot platform. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Particle swarm optimization approach in route navigation for PoSVI-Cane by Toha, Siti Fauziah, Nordin, Nor Hidayati Diyana, Md. Zain, Mohd Zarhamdy

    Published 2023
    “…Therefore, this paper presents the development of a low-cost navigation device – White Cane with Positioning Solution for Visually Impaired (PoSVI-Cane) that can assist those who are visually impaired to travel confidently, even with unfamiliar routes. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Real time vein visualization using near-infrared imaging by May, Y. H., Ernawan, Ferda

    Published 2020
    “…The development stage includes edge detection, vein segmentation and vein visualization. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Optimizing Visual Sensors Placement with Risk Maps Using Dynamic Programming by Altahir, A.A., Asirvadam, V.S., Sebastian, P., Hamid, N.H.B., Ahmed, E.F.

    Published 2022
    “…Thus, related surveillance planning methods optimize the placement of visual sensors based on equally significance grids by not limiting to demand of coverage. …”
    Get full text
    Get full text
    Article
  15. 15

    Development of two matheuristics for production-inventory-distribution routing problem / Dicky Lim Teik Kyee by Dicky Lim , Teik Kyee

    Published 2018
    “…The models in both approaches are solved by using Concert Technology of CPLEX 12.5 Optimizers with Microsoft Visual C++ 2010. Both algorithms are tested on a set of 90 benchmark instances with 50, 100 and 200 customers and 20 periods and the results are competitive when compared to the Memetic Algorithm with Population Management (MA|PM), Reactive Tabu Search (RTS) and Scatter Search (SS). …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Development of a Production Planning and Control Software in Total Productivity Maintenance Environment by Lee, Pang Seng

    Published 2004
    “…The main objectives for this study is to develop a production planning and control (PPC) software in a TPM environment for a manufacturing company and improve the overall production planning and control system from manual recording to computer aided recording which includes some planning features such as Master Production Scheduling (MPS), monthly capacity planning, operation scheduling and other requirements. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Visual servo algorithm of robot arm simulation for dynamic tracking and grasping application by Rishi Arran Suppramaniam, Mohd Hairi Mohd Zaman, Mohd Faisal Ibrahim, Seri Mastura Mustaza, Asraf Mohamed Moubark

    Published 2022
    “…Future works are required to improve the dynamic visual servo algorithm with motion planning when obstacles are present in the path of robot grasping.…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Tumor Extraction for Brain Magnetic Resonance Imaging Using Modified Gaussian Distribution by Salih Al-Badri, Qussay Abbas

    Published 2006
    “…The mutual information algorithms used in this work has been developed and experimented in the system and has proven to yield more accurate and stable results than other algorithms. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article