Search Results - (( identification implementation level algorithm ) OR ( java implementation path algorithm ))
Search alternatives:
- identification implementation »
- implementation level »
- java implementation »
- implementation path »
- level algorithm »
- path algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Register Transfer Level Implementation Of Pooling - Based Feature Extraction For Finger Vein Identification
Published 2017“…A pooling based feature extraction technique for finger vein identification was implemented in this research. The proposed algorithm extracted the local feature information of the finger vein pattern (patches), and used these patches to improve the robustness of the identification. …”
Get full text
Get full text
Thesis -
5
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
6
-
7
-
8
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
9
Analysis characteristic and performance of passive Radio Frequency Identification (RFID) for 13.56MHz system / Mohd Faizul Azmy Amat
Published 2007“…Scopes of work include the algorithm for RFID flow in which frequency band will be continually implemented considering pre-determined constraints. …”
Get full text
Get full text
Thesis -
10
Development of biosignals-based multimodal biometric system
Published 2014“…In order to reach a higher security level, an alternative multimodal and a fusion technique is implemented into the system. …”
Get full text
Get full text
Get full text
Thesis -
11
Identification of continuous-time model of hammerstein system using modified multi-verse optimizer
Published 2021“…For the numerical identifications, three different levels of white noise variances were taken. …”
Get full text
Get full text
Thesis -
12
Improvement of Auto-Tracking Mobile Robot based on HSI Color Model
Published 2018“…For an auto tracking device, the most crucial part of the system is the object identification and tracking of the moving targets. In order to improve the accuracy of identification of object in different illumination and background conditions, the implementation of HSI color model is used in image processing algorithm. …”
Get full text
Get full text
Get full text
Article -
13
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…To improve the proposed algorithm, GA was utilized to identify the best choice for ‘‘mother wavelet function” and “decomposition level” of the signals by means of the fundamental fitness function. …”
Get full text
Get full text
Get full text
Thesis -
14
-
15
A framework for malware identification based on behavior
Published 2012“…The IF-THEN Prediction Rules which is generated using the data mining technique, ID3 Algorithm is used. In the implementation of malware target classification, Structure Level Rules are utilized to classify malware into possible target class. …”
Get full text
Get full text
Thesis -
16
A COLLABORATIVE FRAMEWORK FOR ANDROID MALWARE IDENTIFICATION USING DYNAMIC ANALYSIS
Published 2019Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
17
Cross-layer architecture of impulse-based ultra wideband to support the integration of Radio Frequency Identification and wireless sensor network infrastructures
Published 2012“…Adaptive transmission algorithm has been studied to show the trade-off flexibility between different specific quality of service requirements and transmission rate parameters at the physical-layer level in varied distance scenarios. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Real time nonlinear filtered-x lms algorithm for active noise control
Published 2012“…However, unlike the other algorithms, NLFXLMS cannot be implemented in real time. …”
Get full text
Get full text
Thesis -
19
Security system using biometric technology: Design and implementation of voice recognition system (VRS)
Published 2008“…In this paper, we present an implementation of a security system based on voice identification as the access control key. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Author identification for under-resourced language Kadazandusun
Published 2020“…The workflow of Author Identification implements the machine learning approach to solve the single-labelled multi-class problem and predict the author of a given message in KadazanDusun. …”
Get full text
Get full text
Get full text
Get full text
Article
