Search Results - (( java implementation path algorithm ) OR ( using ((coding using) OR (reading using)) algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Using RGB colour combination in coloured quick response (QR) code algorithm to enhance QR code capacity by Azizi, Abas

    Published 2018
    “…The proposed algorithm integrates the use of compression, multiplexing, and multilayer techniques in encoding and decoding the QR code. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…The recent trend of software development uses OO paradigm. Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Bar Code Detection Using Omnidirectional Vision for Automated Guided Vehicle Navigation by Zahari, Taha, Jessnor Arif, Mat Jizat, Ismayuzri, Ishak

    Published 2012
    “…Images from omnidirectional camera are known to be distorted against the height of the object. We present an algorithm for detecting and reading barcodes successfully without correcting the image distortion. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Chain coding and pre processing stages of handwritten character image file by Suliman, Azizah, Sulaiman, Md. Nasir, Othman, Mohamed, O. K. Rahmat, Rahmita Wirza

    Published 2010
    “…This paper discusses in detail some of the algorithms used in the pre-processing stages of an offline handwritten character image file. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Securing quick response (QR) code using steganography / Muhammad Danial Mohd Alwi by Mohd Alwi, Muhammad Danial

    Published 2021
    “…I have enhancing the QR-code steganography method by using LSB technique in RGB images and QR-code data input image pattern. …”
    Get full text
    Get full text
    Student Project
  10. 10

    Real-time barcode reader using active vision by Ullah Sheikh, Usman

    Published 2004
    “…An adaptive thresholding algorithm is used to reduce the effects of uneven illumination. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…Obfuscation is used to convert source code into a program that works the same way but is much harder to read and understand. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Iot health monitoring system for self quarantined covid-19 patients by Vikneswaran, Balakrishnan

    Published 2022
    “…Then to get the temperature reading we use some algorithm to calculate the temperature reading from sensor. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13
  14. 14

    Protection of the texts using Base64 and MD5 by Taha, Imad, Alahmad, Mohammad, Ahmad, Hanadi

    Published 2012
    “…The main objective of the use of encryption algorithms is to protect data and information in order to achieve privacy. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Automatic detection and indication of pallet-level tagging from rfid readings using machine learning algorithms by Choong, Chun Sern

    Published 2020
    “…In order to further validate the position of the tagging in the pallet box of the Random Forest model developed, a different predefined location was used to validate the model. The best position that could achieve a classification accuracy of 93.30% through the validation process for position five (5) in the systematic model that is the centre of the pallet box. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Development of low power viterbi decoder on complex programmable logic device platform by Abu, Mohd Azlan

    Published 2018
    “…Consequently, the number of logic gates and the total power consumption of the STTC Viterbi decoder can be reduced by using the new algorithms. The proposed algorithms have been designed and implemented by using MATLAB, Altera Quartus 2 and Altera MAX V CPLD board. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Extracting Object Oriented Software Architecture from C++ Source Code by Mresa, Ali Hussein A.

    Published 2000
    “…This research presents a reverse engineering tool VOO++ that will read an Object- Oriented C++ source code using UML notation in order to visualise its Class structure and the various relationships that may exist including, inheritance, aggregation, and dependency relationships based on the modified Cohen-Sutherland clipping algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Design and evaluation of multidimensional turbo product coded MIMO-OFDM system by Muladi, Muladi

    Published 2007
    “…The initial work is developing the dimensional-based reading order (DBRO) algorithm for generating the MDTPC codeword sequences. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A study on matrix factorization and its applications by Tang, Adrian Wen Kai

    Published 2021
    “…Computational steps are important as it serves the basic knowledge to code it in Python. Python also consists of libraries that can be used to calculate the approximated matrix with some parameter tuning. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code by Badawi, Bakri

    Published 2022
    “…A new colour QR code algorithm known as a Fuzzy QR code (FQR code) was proposed to solve the problems faced by current colour QR codes. …”
    Get full text
    Get full text
    Thesis