Search Results - (( java implementation tree algorithm ) OR ( using ((coding using) OR (reading using)) algorithm ))

Refine Results
  1. 1

    Using RGB colour combination in coloured quick response (QR) code algorithm to enhance QR code capacity by Azizi, Abas

    Published 2018
    “…The proposed algorithm integrates the use of compression, multiplexing, and multilayer techniques in encoding and decoding the QR code. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Bar Code Detection Using Omnidirectional Vision for Automated Guided Vehicle Navigation by Zahari, Taha, Jessnor Arif, Mat Jizat, Ismayuzri, Ishak

    Published 2012
    “…Images from omnidirectional camera are known to be distorted against the height of the object. We present an algorithm for detecting and reading barcodes successfully without correcting the image distortion. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Chain coding and pre processing stages of handwritten character image file by Suliman, Azizah, Sulaiman, Md. Nasir, Othman, Mohamed, O. K. Rahmat, Rahmita Wirza

    Published 2010
    “…This paper discusses in detail some of the algorithms used in the pre-processing stages of an offline handwritten character image file. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Securing quick response (QR) code using steganography / Muhammad Danial Mohd Alwi by Mohd Alwi, Muhammad Danial

    Published 2021
    “…I have enhancing the QR-code steganography method by using LSB technique in RGB images and QR-code data input image pattern. …”
    Get full text
    Get full text
    Student Project
  6. 6

    Real-time barcode reader using active vision by Ullah Sheikh, Usman

    Published 2004
    “…An adaptive thresholding algorithm is used to reduce the effects of uneven illumination. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…Obfuscation is used to convert source code into a program that works the same way but is much harder to read and understand. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Iot health monitoring system for self quarantined covid-19 patients by Vikneswaran, Balakrishnan

    Published 2022
    “…Then to get the temperature reading we use some algorithm to calculate the temperature reading from sensor. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10
  11. 11

    Protection of the texts using Base64 and MD5 by Taha, Imad, Alahmad, Mohammad, Ahmad, Hanadi

    Published 2012
    “…The main objective of the use of encryption algorithms is to protect data and information in order to achieve privacy. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Automatic detection and indication of pallet-level tagging from rfid readings using machine learning algorithms by Choong, Chun Sern

    Published 2020
    “…In order to further validate the position of the tagging in the pallet box of the Random Forest model developed, a different predefined location was used to validate the model. The best position that could achieve a classification accuracy of 93.30% through the validation process for position five (5) in the systematic model that is the centre of the pallet box. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Development of low power viterbi decoder on complex programmable logic device platform by Abu, Mohd Azlan

    Published 2018
    “…Consequently, the number of logic gates and the total power consumption of the STTC Viterbi decoder can be reduced by using the new algorithms. The proposed algorithms have been designed and implemented by using MATLAB, Altera Quartus 2 and Altera MAX V CPLD board. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Extracting Object Oriented Software Architecture from C++ Source Code by Mresa, Ali Hussein A.

    Published 2000
    “…This research presents a reverse engineering tool VOO++ that will read an Object- Oriented C++ source code using UML notation in order to visualise its Class structure and the various relationships that may exist including, inheritance, aggregation, and dependency relationships based on the modified Cohen-Sutherland clipping algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Design and evaluation of multidimensional turbo product coded MIMO-OFDM system by Muladi, Muladi

    Published 2007
    “…The initial work is developing the dimensional-based reading order (DBRO) algorithm for generating the MDTPC codeword sequences. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A study on matrix factorization and its applications by Tang, Adrian Wen Kai

    Published 2021
    “…Computational steps are important as it serves the basic knowledge to code it in Python. Python also consists of libraries that can be used to calculate the approximated matrix with some parameter tuning. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code by Badawi, Bakri

    Published 2022
    “…A new colour QR code algorithm known as a Fuzzy QR code (FQR code) was proposed to solve the problems faced by current colour QR codes. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Library reservation system using face detection / Nik Ruslawati Nik Mustapa and Nur Athikah Fatehah Rosli by Nik Mustapa, Nik Ruslawati, Rosli, Nur Athikah Fatehah

    Published 2022
    “…The users are not allowed in a close place, especially in a building or room. The library that used to be packed with people reading books, studying, and using the computer is now becoming empty. …”
    Get full text
    Get full text
    Get full text
    Article