Search Results - (( java application rsa algorithm ) OR ( a constructive ((method algorithm) OR (path algorithm)) ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3

    Route optimization using shortest path method / Muhamad Faisal Amin Shakri by Shakri, Muhamad Faisal Amin

    Published 2025
    “…This study investigated the implementation and comparison between well known shortest path method which are Dijkstra’s algorithm, Bellman-Ford, and A* algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…This research focuses on developing a novel path planning algorithm, called Generalized Laser Simulator (GLS), to solve the path planning problem of mobile robots in a constrained environment. …”
    Get full text
    Thesis
  5. 5

    An efficient algorithm to improve oil-gas pipelines path by Hasan Almaalei, Nabeel Naeem, Mohd Razali, Siti Noor Asyikin, Mohammed Alduais, Nayef Abdulwahab

    Published 2018
    “…Therefore, the aim of this study is to propose a new algorithm to obtain the shortest path connecting oil-gas wells and addressing obstacles that may appear on the path connecting any two wells. …”
    Get full text
    Article
  6. 6
  7. 7

    Optimal QoS aware multiple paths web service composition using heuristic algorithms and data mining techniques by Qtaish, Osama Kayed Taher

    Published 2014
    “…The aim is to solve the above-mentioned problems via an optimization mechanism based upon the combination between runtime path prediction method and heuristic algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Optimizing optimal path trace back for Smith-Waterman algorithm using structural modelling technique by Saliman, Nur Farah Ain

    Published 2012
    “…The optimizing of optimal path trace back system for Smith-Waterman algorithm using structural modelling techniques are presented in this paper. …”
    Get full text
    Get full text
    Student Project
  9. 9
  10. 10

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed by Aneesa Ali, Ali Saeed

    Published 2017
    “…This model driven approach was integrated with the proposed infeasible path detection method which based on analyzing various OCL constructs and operations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    MAZE ROBOT: APPLYING AUTONOMOUS VEHICLE NAVIGATION ALGORITHM WITH EVENT-DRIVEN PROGRAMMING by ABDUL MALEK, NADHIRA

    Published 2011
    “…Hardware and software co-design method is used to construct the mobile robot. The basic navigation algorithm was developed using finite state machine (FSM). …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    Localization using fingerprint method in emergency situation for indoor navigation system / Felix Ceilomond Samam by Samam, Felix Ceilomond

    Published 2015
    “…The results of the fingerprint algorithm for localization shows higher accuracy compare to other methods and the implementation of this method are easy as user require only a mobile device equipped with Wi-Fi facilities to determine the location. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID by Narzullaev, Anvar, Selamat, Mohd Hasan

    Published 2013
    “…We propose a hybrid calibration procedure that combines signal sampling process with path-loss prediction algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    HTS : a hierarchical method for load balancing in autonomous networks. by Ahmad Zukarnain, Zuriati, Udzir, Nur Izura, Othman, Mohamed

    Published 2008
    “…Proposed algorithm fulfills at two steps. Firstly overload detection function through an explorer algorithm to construct overloaded link table due to disruption link. …”
    Get full text
    Get full text
    Article
  16. 16

    Development of obstable avoidance system for 3D robot navigation by Er, Kai Sheng

    Published 2024
    “…To prepare for obstacle avoidance algorithm development, a differential drive robot was constructed, and a URDF description was prepared to ensure correct odometry data conversion from sensor coordinate frames to the robot coordinate frame. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Design and modelling of an autonomous robotic airship with soft computing control by Wong, Wei Kitt

    Published 2012
    “…In this dissertation, fuzzy logic was proposed for the autonomous airship.The navigation technique proposed is the waypoint following algorithm where a path is separated Into a series of waypoints. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Frequent itemset mining using graph theory / Mohammad Arsyad Mohd Yakop by Mohd Yakop, Mohammad Arsyad

    Published 2017
    “…The searching process in the FR-Graph involves the construction of two methods: getPath and item-merging. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Exponential Parameterized Cubic B-Spline Curves And Surfaces by Ammad, Muhammad

    Published 2020
    “…The algorithm computes knot values for parameterization methods. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Time-Uncertainty Analysis by Using Simulation in Project Scheduling Networks by Mohammed Omer, Anwar

    Published 1999
    “…Dealing with risk management in construction is now essential for minimizing losses and to enhance profitability. (2) It is very dangerous to rely only on PERT/CPM conventional techniques in scheduling projects. (3) To use floats, as stated by traditional resource allocation method, is not practicable. (4) For a project network, the likelihood completion date of a project is exactly equal to the product of the probabilities of each path, separately, with respect to a project completion date. …”
    Get full text
    Get full text
    Thesis