Search Results - (( development programme during algorithm ) OR ( java application path algorithm ))
Search alternatives:
- programme during »
- during algorithm »
- java application »
- application path »
- path algorithm »
-
1
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. …”
Get full text
Get full text
Thesis -
2
Visdom: Smart guide robot for visually impaired people
Published 2025“…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
RISC-V instruction set extension on blockchain application
Published 2024“…This would greatly shorten the instructions used by the algorithms and improved the execution time of the programmes. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
-
5
Develpoment of combinatorial optimisation for cutting tool path strategy
Published 2009“…The target was to develop models which mimic the actual cutting process using the Finite Element Method (FEM) and to validate the developed tool path strategy algorithm with the actual machining process and to programmer the developed algorithm into software. …”
Get full text
Get full text
Conference or Workshop Item -
6
Prioritisation Assessment and Robust Predictive System for Medical Equipment: A Comprehensive Strategic Maintenance Management
Published 2024journal::journal article -
7
Computerised Heuristic Algorithm for Multi-location Lecture Timetabling
Published 2020“…A two-stage heuristic algorithm is proposed to solve the multi-location timetabling problem on MSc HRD coursework programme. …”
Get full text
Get full text
Get full text
Thesis -
8
An experimental validation and optimisation tool path strategy for thin walled structure
Published 2011“…The target was to develop models which mimic the actual cutting process using the finite element method (FEM), to validate the developed tool path strategy algorithm with the actual machining process and to programme the developed algorithm into the software. …”
Get full text
Get full text
Get full text
Article -
9
Flowshop scheduling using artificial bee colony (ABC) algorithm with varying onlooker bees approaches
Published 2015“…The findings from this research can be used by system developer or computer programmer to search the optimum sequence during the manufacturing process and improve the flowshop scheduling.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Design and Implementation of Advanced Encryption Standard Using Verilog HDL
Published 2020“…Within this era of technology, privacy and confidentiality are the essential considerations to be addressed as a result of the exponential development of the Internet. One of the main concerns involving software implementation of encryption algorithm is the possibility of slower processing when transmitting and receiving data which consequently will encounter low security level during process of encryption for real-time application. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Logic modeling and mathematical model in developing a tree species selection prototype
Published 2014“…Logic modeling and mathematical model can aid system analysts, system developers and programmers to construct a system during a system development process. …”
Get full text
Get full text
Get full text
Article -
12
A cluster analysis of population based cancer registry in Brunei Darussalam : an exploratory study
Published 2022“…The top three prevalent cancers associated with these subgroups were consistently identified using the three algorithms. Upon comparing the subgroups’ ages during diagnosis, we identify possible screening behaviours of specific subgroups, suggesting for early screening awareness programmes. …”
Get full text
Get full text
Get full text
Article -
13
Implementation of Hybrid Indexing, Clustering and Classification Methods to Enhance Rural Development Programme in South Sulawesi
Published 2024“…The village assistance programme can motivate and engage rural communities during the participatory and transparent phase of village development. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…During data transfer, HMAC is critical for message authentication. …”
Get full text
Get full text
Get full text
Article -
15
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…During data transfer, HMAC is critical for message authentication. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
-
17
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Spacecraft sun-pointing using coplanar solar panels data and magnetic field measurements
Published 2013Get full text
Get full text
Get full text
Proceeding Paper -
19
Design and implementation of advanced encryption standard using verilog HDL
Published 2022“…Within this era of technology, privacy and confidentiality are the essential considerations to be addressed as a result of the exponential development of the Internet. One of the main concerns involving software implementation of encryption algorithm is the possibility of slower processing when transmitting and receiving data which consequently will encounter low security level during process of encryption for real-time application. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate
Published 2019“…By combining the proposed scalar arithmetic and the new point arithmetic 5P, a new scalar multiplication algorithm was developed. This scalar multiplication algorithm is named Q-NAF scalar multiplication for binary curve over Lopez-Dahab coordinates. …”
Get full text
Get full text
Thesis
