Search Results - (( java implications based algorithm ) OR ( after implementation some algorithm ))
Search alternatives:
- after implementation »
- implementation some »
- implications based »
- java implications »
- some algorithm »
-
1
Implementation of Cognitive Mapping Algorithm for Robot Navigation System
Published 2014“…After doing all implementation, finally, some comparison between robot mapping and robot edge follower will be done to observe the differences between these algorithms in term of time and path needed.…”
Get full text
Get full text
Get full text
Proceeding Paper -
2
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010“…As a conclusion, Caesar cipher algorithm can be implemented in hybrid encryption project to make data secure and better.…”
Get full text
Get full text
Undergraduates Project Papers -
3
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010“…This method is names after Julius Caesar who using this method to communicate with his generals.The result from this project is a data which is encrypted and be decrypted to its readable form.As a conclusion,Caesar cipher algorithm can be implemented in hybrid encryption project to make data secure and better.…”
Get full text
Get full text
Undergraduates Project Papers -
4
Implementation of an autonomous mobile robot navigation algorithm using C language
Published 2009“…The objective of the project is to develop navigation algorithm for the autonomous mobile robot. After that, implement the navigation algorithm on the mobile robot and without using the external sensor for navigation of the mobile robot to reach the specified point. …”
Get full text
Get full text
Final Year Project -
5
Enhancement Of Wifi Indoor Positioning System
Published 2011“…Some experiments were performed in the School of Computer Sciences in Universiti Sains Malaysia before implementing the proposed algorithm. …”
Get full text
Get full text
Thesis -
6
Pattern Classification of Human Epithelial Images
Published 2016“…First of all, image enhancement will take part in order to boost efficiency of algorithm by implementing some of the adjustment and filtering technique to increase the visibility of image. …”
Get full text
Get full text
Final Year Project -
7
-
8
The delay with new-additive increase multiplicative decrease congestion avoidance and control algorithm.
Published 2010“…In this research we continued to study the performances of the New-Additive Increase Multiplicative Decrease (AIMD) algorithm as one of the core protocols for TCP congestion avoidance and control mechanism, we want now to evaluate the effect of using the New-AIMD algorithm to measure the queue length and end-to-end delays and we will use the NCTUns simulator to get the results after make the modification of the mechanism. …”
Get full text
Get full text
Article -
9
Multi-objective optimisation of assembly line balancing type-e problem with resource constraints
Published 2016“…The validation phase from the industrial case study concluded that the proposed methodology and algorithm can be implemented in industries. The cycle time of existing layout had been extensively decreased from 16.1 seconds to 13.1 seconds after the optimisation. …”
Get full text
Get full text
Thesis -
10
Token based path allocation approach for mobile robots in sorting centre for achieving high throughput
Published 2024“…This project proposes an improved path-finding algorithm that implements token-based path finding while a robot wants to access a grid cell. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa...
Published 2019“…Cryptography consists of some algorithms but the most common algorithms that had been used are Elliptic Curve Cyptography (ECC) and Rivest-Shamir-Adleman (RSA). …”
Get full text
Get full text
Student Project -
12
Application of adaptive bats sonar algorithm to minimise car side impact design
Published 2017“…This project was focusing on the modification of bats sonar algorithm (BSA) and renamed to adaptive bats sonar algorithm (ABSA) due to some limitations of previous algorithm. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
13
Embedded car plate image recognition system
Published 2008“…The initial step in the recognition process is obtaining a photo of the vehicle, usually by use of a mounted camera. After this, some type of algorithm must be performed to transform an image to a string consisting of the license plate number. …”
Get full text
Learning Object -
14
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
15
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…The proposed algorithms (Priority Dynamic Quantum Time and Multi Priority Dynamic Quantum Time Algorithms) are implemented using JAVA programming language and validated using Key Performance Indicators equations. …”
Get full text
Get full text
Thesis -
16
Ant Colony Optimization for Solving Solid Waste Collection Scheduling Problems
Published 2009“…Formulating this real life problem into vehicle routing problem with stochastic demand model and using some designed algorithms to minimize operation cost of solid waste management. …”
Get full text
Get full text
Get full text
Article -
17
Ant colony optimization for solving solid waste collection scheduling problems
Published 2009“…Formulating this real life problem into vehicle routing problem with stochastic demand model and using some designed algorithms to minimize operation cost of solid waste management. …”
Get full text
Get full text
Get full text
Article -
18
Leader follower pattern formation control using ros for mobile robot application
Published 2022“…ROS will be used to be the main system in controlling the hardware and also to create a virtual environment, generate robot model called Turlebot and implement the algorithms such as SLAM. ROS provides some convenient packages with ROS node and the SLAM algorithms that make the formation problem easier to solve. …”
Get full text
Get full text
Undergraduates Project Papers -
19
Home buyer assistant using artificial bee colony algorithm / Muhammad Izzat Azri Azman
Published 2017“…The ABC algorithm is implemented to improve the recommendation accuracy. …”
Get full text
Get full text
Thesis -
20
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project
