Search Results - (( java implication based algorithm ) OR ( its implementation some algorithm ))

Refine Results
  1. 1

    Implementation of Cognitive Mapping Algorithm for Robot Navigation System by Ismail , Amelia Ritahani, Desia, Recky, Zuhri, Muhammad Fuad Reza, Daniel, Raja Muhammad

    Published 2014
    “…Robot will be given some algorithm for certain task. In this project, we are going to build the cognitive mapping algorithm that can be implemented to the mobile robot. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    Implementation of hybrid encryption method using caesar cipher algorithm by Tat Wi, Charomie

    Published 2010
    “…The result from this project is a data which is encrypted and be decrypted to its readable form. As a conclusion, Caesar cipher algorithm can be implemented in hybrid encryption project to make data secure and better.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Implementation of hybrid encryption method using caesar cipher algorithm by Charomie, Tat Wi

    Published 2010
    “…This method is names after Julius Caesar who using this method to communicate with his generals.The result from this project is a data which is encrypted and be decrypted to its readable form.As a conclusion,Caesar cipher algorithm can be implemented in hybrid encryption project to make data secure and better.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4
  5. 5
  6. 6

    Workability review of genetic algorithm approach in networks by Nurika, O., Zakaria, N., Hassan, F., Jung, L.T.

    Published 2014
    “…Generally, genetic algorithm process will accomplish according to its parameters sizes. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation by Chen, Soong Der

    Published 2000
    “…Therefore, optimizations are desirable especially when software implementation is preferred for its flexibility as compared to hardware implementation. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Computing the autopilot control algorithm using predictive functional control for unstable model by H. A., Kasdirin, J. A., Rossiter

    Published 2009
    “…As a result, by using a trajectory set-point, some positive results is presented and discussed as the missile follow its reference trajectory via some simulation using MATLAB 7.0.…”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Semantic analysis system by using latent semantic analysis (LSA) algorithm on khutbah texts / Ammar Zuber by Zuber, Ammar

    Published 2019
    “…This project will be using Latent Semantic Analysis Algorithm to cope with comparisons of khutbah texts as it’s cover most of the requirement of the system. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin by Shamsudin, Farah Syadiyah

    Published 2017
    “…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. The results of False Matching Ratio (FMR) was 16.67% whilst the False Non-Matching Ratio (FNMR) was 33.33%. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Three-term backpropagation algorithm for classification problem by Saman, Fadhlina Izzah

    Published 2006
    “…Despite the general success of this algorithm, there are several drawbacks and limitations which some of them are the existence of local minima, slow rates of convergence and some of the modification of BP algorithm requires complex and costly calculations at each iteration, which offset their faster rates of convergence. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Designing an algorithm for bioloid humanoid navigating in its indoor environment by Akhtaruzzaman, Md., Shafie, Amir Akramin, Muhammad , Mahbubur Rashid

    Published 2012
    “…Finally the performance of the system is analysed based on the elapsed time of the navigation action with the validation of optimal navigation strategy where the designed algorithm demonstrates the robustness of its implementation and execution. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A new algorithm on Graphical User Authentication (GUA) based on multi-line grids by Lashkari, Arash Habibi, Gani, Abdullah, Sabet, Leila Ghasemi, Farmand, Samaneh

    Published 2010
    “…This is then followed by a discussion on the newly proposed algorithm that is based on a multi size grid and its evaluation by an attacker team. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja by Nurul Hani , Nortaja

    Published 2004
    “…This thesis also provides an explanation about the advantages. functions, characteristics. the degree of complexity in A • algorithm and its implementation in real-world application. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A hybrid algorithm based on artificial bee colony and artificial rabbits optimization for solving economic dispatch problem by Lee, Wei Wen, Hashim, Mohd Ruzaini

    Published 2023
    “…The Artificial Bee Colony (ABC) algorithm has gained widespread attention and has been applied in various fields due to its ability to achieve excellent global optimization results and ease of implementation. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18

    Multi-Backpropagation network by Wan Ishak, Wan Hussain, Siraj, Fadzilah, Othman, Abu Talib

    Published 2002
    “…The learning mechanism for Neural Network is its learning algorithm. Backpropagation (or backprop) algorithm is one of the well-known algorithms in neural networks. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Improved flower pollination optimization algorithm based on swap operator and dynamic switch probability selection by Iqbal, Muhammad

    Published 2023
    “…These algorithms belong to stochastic and nondeterministic classes, have some problems with exploration or exploitation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Cryptography: A New Approach of Classical Hill Cipher by Abdul Rahman, Mohd Nordin, Yusof, Mohd Kamir, Abidin @ Bharun, Ahmad Faisal Amri, Mohamad Usop, Nor Surayati

    Published 2013
    “…Studies on previous results showed that the existing Hill algorithms are not yet sufficient. Some of these algorithms are still vulnerable to known plaintext attack. …”
    Get full text
    Get full text
    Article