Search Results - (( using ((function path) OR (function a)) algorithm ) OR ( using visual basic algorithm ))
Search alternatives:
- basic algorithm »
- using visual »
- function a »
-
1
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004“…This system is implemented on a Windows platform with Visual Basic as a programming language and 3-DES as a main encryption algorithm. …”
Get full text
Get full text
Thesis -
2
A new image scrambling technique using block rotation algorithm based on Rubik’s cube
Published 2013“…The first part of the algorithm aims to build a rotation table using hash function within scramble phase and descramble phase to generate a scrambled (rotated) image and the retrieved image. …”
Get full text
Get full text
Get full text
Article -
3
Synthesis of transistor chaining algorithm for CMOS cell layout using euler path / Sukri Hanafiah
Published 1997“…The euler's path it using pseudo input and Heuristic algorithm to find the minimum interlace. …”
Get full text
Get full text
Thesis -
4
Ultrasonic Tomography System For Liquid/Gas Flow: Frame Rate Comparison Between Visual Basic And Visual C++ Programming
Published 2006“…By using a suitable image reconstruction algorithm, the tomogram will be interfaced with a tomography measurement system and a personal computer using Keithley DAS-1802HC interfacing card. …”
Get full text
Get full text
Get full text
Article -
5
A-star (A*) algorithm implementation for robotics path planning navigation
Published 2018“…This algorithm also known as the most famous used algorithm in path planning because of its ability to provide a collision-free pathway with a minimum path score. …”
Get full text
Get full text
Undergraduates Project Papers -
6
Cognitive map approach for mobility path optimization using multiple objectives genetic algorithm
Published 2023Conference Paper -
7
A secure message handler using microsoft cryptoapi
Published 2003“…This dll file serves as a reference for any Visual Basic application which needs to call the CtyptoAPI function. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
A secure message handler using microsoft cryptoapi
Published 2003“…This dll file serves as a reference for any Visual Basic application which needs to call the CtyptoAPI function. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
BMTutor research design: Malay sentence parse tree visualization
Published 2014“…As a result of the lack of models and algorithms have been introduced in both parsers, the model and algorithm development phase is introduced in the design of BMTutor.Output from the development process shows that the prototype is able to provide sentence correction for all 15 invalid sentences and can produce parse tree visualizations for all 20 sentences used for prototype testing.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Hybrid path planning for indoor robot with Laplacian Behaviour-based control via four point-explicit group
Published 2014“…Consequently, the gradient of the potential functions would be used by the searching algorithm to generate path from starting to goal location. …”
Get full text
Get full text
Get full text
Article -
11
Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli
Published 2021“…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. …”
Get full text
Get full text
Thesis -
12
-
13
Wi-fi fingerprint database construction using Chebyshev wavelet functions
Published 2015“…Next, the collected reference samples are used to construct area specific path-loss prediction function using Chebyshev wavelets. …”
Get full text
Get full text
Conference or Workshop Item -
14
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2017“…This paper proposes an algorithm framework to deal with these false paths through identification for DFT test. …”
Get full text
Get full text
Article -
15
Application of harmonic functions through Modified SOR (MSOR) method for robot path planning in indoor structured environment
Published 2017“…It is known that harmonic functions are very suitable to be used as a global approach for robot path planning. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…Embedded C language codes are then written to test the functionality of the RSA co-processor on hardware. Upon verification, a demonstration application prototype that performs RSA encryption and decryption is developed using Visual Basic 6.0. …”
Get full text
Get full text
Thesis -
17
Nlfxlms and thf-nlfxlms algorithms for wiener-hammerstein nonlinear active noise control
Published 2016“…In recent works, it was shown that the SEF can be approximated using tangential hyperbolic function (THF) for Hammerstein and Wiener NLFXLMS algorithms, such that the degree of nonlinearity can be estimated using modelling approach. …”
Get full text
Get full text
Thesis -
18
Nonlinear FXLMS algorithm for active noise control systems with saturation nonlinearity
Published 2012“…However, NLFXLMS cannot be implemented in real time because the modeling of the SEF cannot be realized. In this paper, a new method to model the secondary path using the Hammerstein model structure and tangential hyperbolic function (THF) is proposed. …”
Get full text
Get full text
Get full text
Article -
19
The Development Of A Robust Algorithm For Uav Path Planning In 3d Environment
Published 2016“…IE attained a 92% probability rate of achieving a short path length in 100 case studies. …”
Get full text
Get full text
Thesis -
20
Robotic indoor path planning using dijkstra's algorithm with multi-layer dictionaries
Published 2016“…Dijkstra's algorithm is a classic algorithm for finding the shortest path between two points due to its optimisation capability. …”
Get full text
Get full text
Conference or Workshop Item
