Search Results - (( filing implementation some algorithm ) OR ( java optimization path algorithm ))

Refine Results
  1. 1

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  2. 2

    SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing by Abd, Wamidh Jwdat

    Published 2019
    “…This work uses iterative smoothing algorithm to find an alternative path with less distance and energy consumption. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Energy efficient path reconstruction in wireless sensor network using iPath by Hasan, Sazlinah, Abd, Wamidh Jwdat, Ariffin, Ahmad Alauddin

    Published 2019
    “…This work uses iterative boosting algorithm to find an alternative path with less distance and energy consumption. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…Core functionalities such as path planning, autonomous movement, voice feedback, and app-to-robot communication have been thoroughly tested and optimized. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Sentiment Analysis of Airline Reviews Using Naive Bayes Algorithm / Ahmad Firdaus Maliki by Maliki, Ahmad Firdaus

    Published 2021
    “…The overview for the methodology is divided into three phases which are preliminary phase, design and implementation phase and evaluation phase. Several classifier models have been built by using Naive Bayes algorithm during the design and implementation phase where the model that has the highest accuracy has been chosen for this project. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Implementing data hiding in still images / lman Hazwam Abd. Halim and Roshidi Din by Abd. Halim, lman Hazwam, Din, Roshidi

    Published 2004
    “…Each of these techniques can be applied, with varying degrees of success, to different image files formats. The data hiding process of each method will be discussed in this paper and the comparison tables that. show the suitability of different image file types with the recent data hiding methods according to some parameters also will be provided. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Stray animal complaint system using geolocation technique with rule-based Algorithm / Albin Lemuel Kushan … [et al.] by Kushan, Albin Lemuel, Mahadi, Mohamad Tajuddin, Zulhemay, Mohd Nabil, Sadikan, Siti Fairuz Nurr, Mishan, Mohd Taufik

    Published 2021
    “…Therefore, this project intended to provide a better platform for local neighbourhood to file their complaint and the local council to address the filed complaint. …”
    Get full text
    Get full text
    Get full text
    Book Section
  10. 10

    JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation by Abu, Ahmad Zaidee

    Published 2008
    “…With the same compression properties, this encryption algorithm was shown to be able to produce average file size smaller than baseline JPEG and other encryption. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    A new algorithm on Graphical User Authentication (GUA) based on multi-line grids by Lashkari, Arash Habibi, Gani, Abdullah, Sabet, Leila Ghasemi, Farmand, Samaneh

    Published 2010
    “…Finally, a comparison of the newly proposed algorithm and previous algorithms will be evaluated in a table.…”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    RISC-V instruction set extension on blockchain application by Cheong , Kin Seng

    Published 2024
    “…In this project, some instructions were proposed to execute the cryptographic algorithm in shorter clock cycles and shorter execution time. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Task scheduling in cloud computing using hybrid genetic algorithm and bald eagle search (GA-BES) by Kamal Khairi Supaprhman

    Published 2022
    “…The natural evolution optimization algorithm which is genetic algorithm can be improve by combining the nature meta-heuristic algorithms which is bald eagle search to improve the makespan of genetic algorithm using cloudsim that need to be implement on the eclipse platform. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  19. 19

    VLSI implementation of huffman design using FPGA with a comprehensive analysis of power restrictions by Mohammed, Maan Hameed, Khmag, Asem, Rokhani, Fakhrul Zaman, Ramli, Abd. Rahman

    Published 2015
    “…However, Huffman coding has some limitations where it depends on the stream of symbols appearing in a file. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    A grid enabled E-theses and dissertations repository system by Por, L.Y., Ong, S.Y., Beh, D., Ismail, M.

    Published 2002
    “…Some of the universities in Malaysia are still implementing hybrid Electronic Theses and Dissertations (ETD) approach in managing Theses and Dissertations (TD). …”
    Get full text
    Get full text
    Get full text
    Article