Search Results - (( process oriented path algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    Adaptable decentralized orchestration engine for block structured non-transactional workflow in service oriented architecture. by Esfahani, Faramarz Safi

    Published 2011
    “…In the Service Oriented Architecture (SOA), business processes are executed by nonscalable centralized orchestration engines. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Loudspeaker nonlinearity compensation with inverse tangent hyperbolic function-based predistorter for active noise control by Sahib, Mouayad Abdulredha, Raja Ahmad, Raja Mohd Kamil

    Published 2014
    “…In active noise control (ANC), the performance of the filtered-x least mean squares (FXLMS) algorithm is degraded by the saturation of the loudspeaker in the secondary path. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Machine Learning-Enabled Communication Approach for the Internet of Medical Things by Rahim Khan, Abdullah Ghani, Samia Allaoua Chelloug, Mohammed Amin, Aamir Saeed, Jason Teo

    Published 2023
    “…For this purpose, the proposed scheme utilises a well-known technique, i.e., Kruskal’s algorithm, to find an optimal path from source to destination wearable devices. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A Review: Current Trend of Immersive Technologies for Indoor Navigation and the Algorithms by Sariman, Muhammad Shazmin, Othman, Maisara, Mat Akir, Rohaida, Mahamad, Abd Kadir, Ab Rahman, Munirah

    Published 2024
    “…Based on the findings of this review, we can conclude that an efficient solution for indoor navigation that uses the capabilities of embedded data and technological advances in immersive technologies can be achieved by training the shortest path algorithm with a deep learning algorithm to enhance the indoor navigation system.…”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Intelligent auto tracking in 3D space by image processing by Al-Khateeb, Khalid A. Saeed, Awang, Mat Kamil, Khalifa, Othman Omran

    Published 2009
    “…The servo drive signals for both the robot motion and the angular positioning of the cameras are derived from the image processing algorithm that keeps the centroid of the target image in the center of the frame and the target in line with the axis of the optical system. …”
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    Reconfigurable Stewart Platform for Spiral Contours by G. , Satheesh Kumar, T. , Nagarajan

    Published 2011
    “…The results obtained are to be validated for singularity-free path planning and attempt has to be made to estimate the computational efficiency of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  8. 8

    Online teleoperation of writing manipulator through graphics processing unit based accelerated stereo vision by Abu Raid, Fadi Imad Osman

    Published 2021
    “…The proposed algorithms aim to accelerate the processes of distortion removal and rectification using precomputed combined maps. …”
    Get full text
    Get full text
    Thesis
  9. 9

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Quality of service multicast routing protocol for large scale MANETs by Qabajeh, Mohammad M., Hassan Abdalla Hashim, Aisha, Khalifa, Othman Omran, Qabajeh, Liana K.

    Published 2009
    “…Also, it achieves a significant reduction in processing overhead than non hierarchical algorithm…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Routing A ware Distributed Service Discovery Architecture with Intelligent Message Routing by HAJA NAZMUDEEN, MOHAMED SALEEM

    Published 2012
    “…A suitable query routing algorithm was developed and tested with the DSD architecture.…”
    Get full text
    Get full text
    Thesis
  12. 12

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  13. 13

    A review of slicing techniques in software engineering by Shah, Asadullah, Raza, Ali, Hassan, Basri, Shah, Abdul Salam

    Published 2015
    “…Program slice is the part of program that may take the program off the path of the desired output at some point of its execution. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Enhancing navigation accuracy of Turtlebot3 Burger mobile robot by Muhammad Haniff, Gusrial, Muhammad Luqman Hakim, Abdullah, Nur Aqilah, Othman, Hamzah, Ahmad

    Published 2024
    “…The basic navigation of the robot requires a significant amount of data and resources to process the output path. To address this challenge, the Kalman Filter algorithm is implemented in this robot, as it is widely used for mobile robot navigation and system integration. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    A YOLO-based deep learning model for Real-Time face mask detection via drone surveillance in public spaces by A. Mostafa, Salama, Ravi, Sharran, Zebari, Dilovan Asaad, Zebari, Nechirvan Asaad, Mohammed, Mazin Abed, Nedoma, Jan, Martinek, Radek, Deveci, Muhammet, Ding, Weiping

    Published 2024
    “…Addressing these challenges entails an efficient and robust object detection and recognition algorithm. This algorithm can deal with a crowd of multiple faces via a mobile camera carried by a mini drone, and performs realtime video processing. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis
  20. 20

    Integrated robotic arm control: inverse kinematics, trajectory planning, and performance evaluation for automated welding by Nur Huda, Arif, Pebrianti, Dwi, Md Zain, Zainah

    Published 2023
    “…An experimental setup involving a robotic arm controlled by an Arduino Mega 2560 microcontroller, embedded with the inverse kinematic algorithm and trajectory planning, is executed. Data acquisition involves inputting coordinates and orientation for automatic welding along a straight path. …”
    Get full text
    Get full text
    Get full text
    Article