Search Results - (( java implementation path algorithm ) OR ( using reading using algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Missing tags detection algorithm for radio frequency identification (RFID) data stream by Zainudin, Nur 'Aifaa

    Published 2019
    “…Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Analysis on reading image through camera image by Amir Hamzah Ani

    Published 2024
    text::Final Year Project
  7. 7

    Fault detection with optimum March test algorithm by Zakaria, Nor Azura, Wan Hassan, Wan Zuha, Abdul Halin, Izhal, Mohd Sidek, Roslina, Xiao, Qing Wen

    Published 2013
    “…The main focus of this research is to improve fault coverage on Single Cell Faults as well as Static Double Cell Faults detection, using specified test algorithm. Transition Coupling Faults (CFtrs), Write Destructive Coupling Faults (CFwds) and Deceptive Read Destructive Faults (CFdrds) are types of faults mainly used in this research. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Modelling of the anti-collision algorithm in RFID system: article / Shafinaz Ismail by Ismail, Shafinaz

    Published 2014
    “…In RFID system, the greatest challenge faced is the tag could not be read due to collisions. To avoid these collisions, there are several anti-collision algorithms used in the RFID system. …”
    Get full text
    Get full text
    Article
  9. 9

    Modelling of the anti-collision algorithm in RFID system / Shafinaz Ismail by Ismail, Shafinaz

    Published 2014
    “…In RFID system, the greatest challenge faced is the tag could not be read due to collisions. To avoid these collisions, there are several anti-collision algorithms used in the RFID system. …”
    Get full text
    Get full text
    Thesis
  10. 10

    The data and read/write controller for March-based SRAM diagnostic algorithm MBIST by Mat Isa, Masnita, Wan Hasan, Wan Zuha, Mohd Sidek, Roslina, Abdul Halin, Izhal

    Published 2009
    “…This paper presents the implementation of March-based algorithm as proposed in into an Memory Built-in Self-Test (MBIST) data and read/write controller. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Segmentation of Malay syllables in connected digit speech using statistical approach by Salam, M.S., Mohamad, Dzulkifli, Saleh, S.H.

    Published 2008
    “…Segmentation was done in time domain signal using statistical approaches namely the Brandt’s Generalized Likelihood Ratio (GLR) algorithm and Divergence algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Context-aware diabetic patient remote monitoring using wearable and mobile App / Mohd Izzat Ismail Hashim by Ismail Hashim, Mohd Izzat

    Published 2019
    “…By applying this algorithm, LoveHealth is able to detect critical glucose reading, which are inputted by the patients manually, or heartrate readings captured from the patients' smartwatch, and notifies their respective caregivers, informing them that they require medical attention. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…Advanced Encryption Standard algorithm is being used to encrypt the text messaging. …”
    Get full text
    Get full text
    Student Project
  14. 14

    Iot health monitoring system for self quarantined covid-19 patients by Vikneswaran, Balakrishnan

    Published 2022
    “…Then to get the temperature reading we use some algorithm to calculate the temperature reading from sensor. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15

    Fault detection with optimum March Test Algorithm by Zakaria, Nor Azura, Wan Hasan, Wan Zuha, Abdul Halin, Izhal, Mohd Sidek, Roslina, Wen, Xiaoqing

    Published 2012
    “…However after solving the undetected fault, the outcome in term of its detection result of Static Double Cell Faults using the specified test algorithm especially Transition Coupling Faults (CFtrs), Write Destructive Coupling Faults (CFwds), Read Destructive Coupling Faults (CFrds) and Deceptive Read Destructive Faults (CFdrds) are observed.…”
    Get full text
    Conference or Workshop Item
  16. 16

    Evaluation of automated phonetic labeling and segmentation for dyslexic children’s speech by Husni, Husniza, Yusof, Yuhanis, Kamaruddin, Siti Sakira

    Published 2013
    “…This is due to the highly phonetically similar reading errors produced when they read that have affected automatic speech recognition (ASR).In this work, experiments were performed using a specifically designed ASR to force-align the read speech and produce the labels and segmentations automatically.The CSLU toolkit’s force alignment algorithm has been employed to measure their performances.Selected speech data of dyslexic children’s reading in Malay were fed to the algorithm as input and the evaluation resulted in 95% agreement on phonetic labeling and only 65% on segmentation with respect to the manual ones.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    A Faster External Sorting Algorithm Using No Additional Disk Space by Islam, Md. Rafiqul, Md. Sap, Mohd. Noor, Sarker, Md. Sumon, Islam, Sk. Razibul

    Published 2006
    “…The proposed algorithm uses special in-place merging technique, which creates no extra backup file for manipulating huge records. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    RFID data reliability optimiser based on two dimensions bloom filter by Yaacob, Siti Salwani, Mahdin, Hairulnizam, Kasim, Shahreen

    Published 2017
    “…The noise and duplicate data filtering algorithm was constructed based on bloom filter. There are two bloom filters in one algorithm where each filter holds function either to remove noise data and to recognize data as correct reading from duplicate data reading. …”
    Get full text
    Get full text
    Article
  20. 20

    Multiple and solid data background scheme for testing static single cell faults on SRAM memories by Zakaria, Nor Azura

    Published 2013
    “…Therefore, the purpose of this thesis is to introduce a Data Background (DB) scheme to generate an optimal March Test Algorithm (MTA) for detecting faults of memory that are undetectable using existing algorithms. …”
    Get full text
    Get full text
    Thesis