Search Results - (( rule expansion function algorithm ) OR ( java application path algorithm ))

  • Showing 1 - 5 results of 5
Refine Results
  1. 1

    A collision resistant cryptographic hash function based on cellular automata rules by Jamil, Norziana

    Published 2013
    “…The study shows that 23 of the rules are cryptographically strong where eight of them are used in our hash function design. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Implementation and simplification of an Output Shifted Coding Modulation (OSCM) on a high speed DSP processor / Roslina Mohamad, Wan Nor Syafizan Wan Muhamad and Rosmalini Abdul Ka... by Mohamad, Roslina, Wan Muhamad, Wan Nor Syafizan, Abdul Kadir, Rosmalini

    Published 2009
    “…It is capable of reducing the bandwidth expansion by using Tr/4-shift DQPSK. This is achieved through fine tuning the set of rules for the mapping of coded bits and also with modifying error detection and correction techniques in trellis diagram. …”
    Get full text
    Get full text
    Research Reports