Search Results - (( program modeling path algorithm ) OR ( java application system algorithm ))
Search alternatives:
- program modeling »
- java application »
- system algorithm »
- path algorithm »
- modeling path »
-
1
-
2
Development of Path Loss Models for Smooth and Convex Surfaces Terrains in Malaysian Environment
Published 2004“…The results show that these entire models gave unsatisfactory results when compared with the measured path losses, where for smooth terrain, the FSL, PEL and WI models overestimated the path loss as high as 72%, 70% and 23%, respectively and for single and double convex surfaces terrains, the E-P, D, E-D, B-L and G models overestimated the path loss as high as 25% in all measurement frequencies. …”
Get full text
Get full text
Thesis -
3
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
4
-
5
-
6
A Novel Integrating Between Tool Path Optimization Using An ACO Algorithm And Interpreter For Open Architecture CNC System
Published 2021“…In the context of automatic NC program production, the optimization of the cutting tool’s travel path could be achieved by integrating the ACO algorithm and the Open Architecture Control (OAC) into commercial CAD/CAM. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Scheduling of batch process plant / Abdul Aziz Abu Bakar
Published 1995“…The software developed is menu-driven graphical tool for simulating schedules for studied model. By using Turbo Pascal programming language, major programs are linked and displayed. …”
Get full text
Get full text
Student Project -
8
Real-time algorithmic music composition application.
Published 2022“…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
-
10
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
11
-
12
Optimum Time-Cost Trade-Off Strategies on Critical Path Method for Project Management
Published 2010“…In addition, we have built some of Linear Programming models that have been of great value in analyzing project time-cost trade-offs problems. …”
Get full text
Get full text
Thesis -
13
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
14
-
15
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
16
-
17
Path Following Using A Learning Neural Network
Published 2004“…The implemented neural controller will in turn minimize a performance index, which includes the lateral and attitude angle errors ofvehicle models with respect to the paths. The thesis differs from [2] in a sense that different types of neural controller are established to achieve a better path following accuracy. …”
Get full text
Get full text
Final Year Project -
18
Graphical user interface for surface roughness prediction of CNC milling machine / Muhammad Qayyum Nor Asffan
Published 2020“…It can function to analyse data, develop algorithms even create models and applications. In this research, MATLAB Graphical User Interface (GUI) is used to develop a user- friendly program that can predict surface roughness of Aluminium 6061 in CNC milling machine. …”
Get full text
Get full text
Student Project -
19
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
20
Network game (Literati) / Chung Mei Kuen
Published 2003“…The possible applications of multimedia-networked system are endless, as the demand to support interactive communication among groups of users has increased significantly. …”
Get full text
Get full text
Thesis
