Search Results - (( identification implementation level algorithm ) OR ( java implementation path algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Register Transfer Level Implementation Of Pooling - Based Feature Extraction For Finger Vein Identification by Mohamed Ali, Mohamed Hassan

    Published 2017
    “…A pooling based feature extraction technique for finger vein identification was implemented in this research. The proposed algorithm extracted the local feature information of the finger vein pattern (patches), and used these patches to improve the robustness of the identification. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Analysis characteristic and performance of passive Radio Frequency Identification (RFID) for 13.56MHz system / Mohd Faizul Azmy Amat by Amat, Mohd Faizul Azmy

    Published 2007
    “…Scopes of work include the algorithm for RFID flow in which frequency band will be continually implemented considering pre-determined constraints. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Development of biosignals-based multimodal biometric system by Osamah Sadeq Alhamdani

    Published 2014
    “…In order to reach a higher security level, an alternative multimodal and a fusion technique is implemented into the system. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Identification of continuous-time model of hammerstein system using modified multi-verse optimizer by Most. Julakha, Jahan Jui

    Published 2021
    “…For the numerical identifications, three different levels of white noise variances were taken. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Improvement of Auto-Tracking Mobile Robot based on HSI Color Model by Sundarajoo, Suresh, Ahmad Shahrizan, Abdul Ghani

    Published 2018
    “…For an auto tracking device, the most crucial part of the system is the object identification and tracking of the moving targets. In order to improve the accuracy of identification of object in different illumination and background conditions, the implementation of HSI color model is used in image processing algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar by Seyed Alireza, Ravanfar

    Published 2017
    “…To improve the proposed algorithm, GA was utilized to identify the best choice for ‘‘mother wavelet function” and “decomposition level” of the signals by means of the fundamental fitness function. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    A framework for malware identification based on behavior by Mohamad Fadli, Zolkipli

    Published 2012
    “…The IF-THEN Prediction Rules which is generated using the data mining technique, ID3 Algorithm is used. In the implementation of malware target classification, Structure Level Rules are utilized to classify malware into possible target class. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Cross-layer architecture of impulse-based ultra wideband to support the integration of Radio Frequency Identification and wireless sensor network infrastructures by Mohammed Saeed, Jawad, Widad, Ismail, Ahmad, Badrul Hisham

    Published 2012
    “…Adaptive transmission algorithm has been studied to show the trade-off flexibility between different specific quality of service requirements and transmission rate parameters at the physical-layer level in varied distance scenarios. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Real time nonlinear filtered-x lms algorithm for active noise control by Sahib, Mouayad Abdulredha

    Published 2012
    “…However, unlike the other algorithms, NLFXLMS cannot be implemented in real time. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Security system using biometric technology: Design and implementation of voice recognition system (VRS) by A. Rashid, Rozeha, Mahalin, Nur Hija, Sarijari, Mohd. Adib, Abdul Aziz, Ahmad Aizuddin

    Published 2008
    “…In this paper, we present an implementation of a security system based on voice identification as the access control key. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Author identification for under-resourced language Kadazandusun by Nursyahirah, Tarmizi, Suhaila, Saee, Dayang Hanani, Abang Ibrahim

    Published 2020
    “…The workflow of Author Identification implements the machine learning approach to solve the single-labelled multi-class problem and predict the author of a given message in KadazanDusun. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article