Search Results - (( java implementation ant algorithm ) OR ( using code new algorithm ))

Refine Results
  1. 1

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A new corner detection algorithm for chain code representation. by Haron , Habibollah, Shamsuddin , Siti Mariyam, Mohamed, Dzulkifli

    Published 2005
    “…A new algorithm is proposed to detect a corner of a thinned binary image that is represented by an eight-connected contour chain code. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Enhanced algorithms for three-dimensional object interpreter by Haron, Habibollah

    Published 2004
    “…Besides reducing the number of image regularities used and new method to solve the linear system, this study has proposed better solutions in terms of an enhanced thinning algorithm, a modified Freeman chain code algorithm as picture description language, and a new computational comer detection algorithm.…”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Development of computer aided three-dimensional geometric modeler based on designer's idea in twodimensional by Haron, Habibollah

    Published 2006
    “…These algorithm are used to produce chain code series that represented a thinned binary image of the sketch. …”
    Get full text
    Get full text
    Monograph
  7. 7

    Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code by Badawi, Bakri

    Published 2022
    “…A new colour QR code algorithm known as a Fuzzy QR code (FQR code) was proposed to solve the problems faced by current colour QR codes. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Steganography algorithm to hide secret message inside an image by Ibrahim, Rosziati, Teoh, Suk Kuan

    Published 2011
    “…The proposed algorithm uses binary codes and pixels inside an image. …”
    Get full text
    Get full text
    Article
  9. 9

    Automatic marking system for programming subject by Chan, Jin Yee

    Published 2023
    “…To achieve this, this project use cloud compute resources that contain Docker container which act as an isolation for anonymous code execution. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10
  11. 11
  12. 12

    Development of a scalable video compression algorithm by Khalifa, Othman Omran, Issa, Sinzobakwira, Olanweraju, Rashidah Funke, Al Khazmi, El Mahdi A

    Published 2012
    “…To improve the perceptual quality of coded video in a computation-constrained scenario, through controlling per-frame complexity, a rate-distortion optimised (RDO) rate control algorithm for encoding low bit rate video helped to achieve the target bitrates and PSNR using Lagrangian multiplier function. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    Development of new code for optical code division multiple access systems by Hilal Adnan, Fadhil

    Published 2011
    “…Splitting algorithm is proposed to construct the new code families namely RD code. …”
    Get full text
    Thesis
  14. 14

    1D Multigrid Solver For Finite Element Method by Azhar, Mohamad Amiruddin

    Published 2022
    “…The new algorithm also has been tested using time simulation. …”
    Get full text
    Get full text
    Monograph
  15. 15

    Parallel Block Methods for Solving Ordinary Differential Equations by Abdul Majid, Zanariah

    Published 2004
    “…The new codes were then used for the parallel implementation in solving large systems of first and higher order ODEs. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Artificial intelligent power prediction for efficient resource management of WCDMA mobile network by Tee Y.K., Tinng S.K., Koh J., David Y.

    Published 2023
    “…The output of SVR will be used by WCDMA mobile network to decide on new service admission. …”
    Conference Paper
  17. 17

    Encrypting text data using elliptic curve cryptography by Ali, Abas Abdullahi

    Published 2018
    “…Encrypting and decrypting any text that has an equivalent ASCII code is the core principle of this algorithm.…”
    Get full text
    Get full text
    Thesis
  18. 18

    Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm by Mohammed Alaidaros, Hashem

    Published 2007
    “…Hashed Message Authentication Code (HMAC) is widely used to provide authenticity, while symmetric encryption algorithms provide confidentiality. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20