Search Results - (( java implementation path algorithm ) OR ( using quality filing algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- filing algorithm »
- path algorithm »
- quality filing »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
A Comparative Study on Compression of Different Image File Formats
Published 1999“…Beside that, the quality of image that can be produced by LZW algorithm and RLE algorithm is almost the same.…”
Get full text
Get full text
Thesis -
6
Steganography : concealing texts within an image using least significant BIT technique on BMP image format / Farabi Aizat Mohd Aminnuddin
Published 2019“…This research used Least Significant Bits (LSB) as the algorithm to embed the messages. …”
Get full text
Get full text
Student Project -
7
An intermediate significant bit (ISB) watermarking technique using neural networks
Published 2016“…Many researchers have used these approaches to evaluate their algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
-
9
On the Identification of FOSD-based Non-zero Onset Speech Dataset
Published 2020“…In such tools, often onset detection algorithms are utilized for labeling the audio file's speech start and end times. …”
Get full text
Get full text
Conference or Workshop Item -
10
Prototype development for embedding large amount of information using secure LSB and neural based steganography
Published 2009“…The need for new methods, techniques and algorithms to make enhancements regarding increasing the amount the hidden information, preserving the host file quality, preserving the size of the file, and keep it robust against steganalysis. …”
Get full text
Get full text
Thesis -
11
Performance evaluation of compression techniques on scientific dataset / Lam Wai Leong
Published 2006“…This project proves that a generic compression algorithm fair better compare to a more format specific compression algorithm when use on a scientific datasets. …”
Get full text
Get full text
Thesis -
12
Optimizing lossless compression by normalized data length in Huffman Algorithm
Published 2022“…These two indicators are used to calculate and analyse the file size reduction and the ability of the file to be reconstructed back to its original form without compromising its quality. …”
Get full text
Get full text
Get full text
Thesis -
13
An Adaptive Multi Amplitude Thresholds Embedding Algorithm for Audio Steganography
Published 2024“…The algorithm uses AES-256 to increase the level of robustness. …”
Article -
14
Big Data Mining Using K-Means and DBSCAN Clustering Techniques
Published 2022“…The density-based spatial clustering of applications with noise (DBSCAN) and the K-means algorithm were used to develop clustering algorithms. …”
Get full text
Get full text
Article -
15
The enhancement of mammographic images of breast cancer using median filtering (software development ) / Noor Saedah Selamat
Published 1996“…In this project, the development of median filtering algorithm were used to improve the quality of mammography images, hence this image can be used to determined and to detect any abnormalities in the image. …”
Get full text
Get full text
Thesis -
16
-
17
An intermediate significant bit (ISB) watermarking technique using neural networks
Published 2016“…Many researchers have used these approaches to evaluate their algorithms. …”
Get full text
Get full text
Article -
18
Resource scheduling algorithm with load balancing for cloud service provisioning
Published 2019“…Cloud computing uses scheduling and load balancing for virtualized file sharing in cloud infrastructure. …”
Get full text
Get full text
Article -
19
Parallelization of speech compression based algorithm based on human auditory system on multicore system
Published 2012“…Matlab parallel computing toolbox was used in the implementation. Finally, the performance of the developed parallel algorithm was evaluated using Perceptual Evaluation of Speech Quality (PESQ) and parallel execution time. …”
Get full text
Get full text
Get full text
Article -
20
DCT domain Stegasvm-shifted LSB model for highly imperceptible and robust cover-image / Hanizan Shaker Hussain
Published 2014“…Beside the LSB technique, there is other technique that is also influential i.e support vector machine (SVM) normally used to strengthen the embedding algorithm. Whatever techniques used in the image steganography field,the main purpose is to keep the existence of the secret-message secret. …”
Get full text
Get full text
Thesis
