Search Results - (( using function ((a algorithm) OR (new algorithm)) ) OR ( basic visualization system algorithm ))

Refine Results
  1. 1

    Stereo vision for visual object tracking and distance measurement assessment / Sukarnur Che Abdulla...[et al.] by Che Abdullah, Sukarnur, Amari, Mohamad Dzulhelmy, Ohka, Masahiro

    Published 2019
    “…Furthermore, the project proposes a new program algorithm for binocular vision system to work, in order to identify distance of an object with a basic equation has been derived and set in the designed algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Ciphercrypt-an Encryption System / Nor Hidayah Ngah by Nor Hidayah, Ngah

    Published 2004
    “…This system is implemented on a Windows platform with Visual Basic as a programming language and 3-DES as a main encryption algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Web Camera Application For Motion Detection by Koay, Su Yeong

    Published 2003
    “…In the third stage, implementation process is done by coding the motion detection software using Microsoft Visual Basic 6.0. The algorithm that was successfully simulated is used as the reference for forming the working mechanism in creating motion detection software. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Ultrasonic Tomography System For Liquid/Gas Flow: Frame Rate Comparison Between Visual Basic And Visual C++ Programming by Abdul Rahim, Ruzairi, Mohd. Nayan, Norkharziana, Fazalul Rahiman, Mohd. Hafiz

    Published 2006
    “…By using a suitable image reconstruction algorithm, the tomogram will be interfaced with a tomography measurement system and a personal computer using Keithley DAS-1802HC interfacing card. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Website assurance monitoring application with MD5 Hashing and SHA-26 Algorithm / Abdullah Sani Abd Rahman and Samsiah Ahmad by Abd Rahman, Abdullah Sani, Ahmad, Samsiah

    Published 2022
    “…Time consuming and growing of websites complexity is additional reasons of the inadequate website assurance. This paper presents a new framework for websites integrity assurance through a website monitoring application. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    BMTutor research design: Malay sentence parse tree visualization by Muhamad Noor, Yusnita, Jamaludin, Zulikha

    Published 2014
    “…As a result of the lack of models and algorithms have been introduced in both parsers, the model and algorithm development phase is introduced in the design of BMTutor.Output from the development process shows that the prototype is able to provide sentence correction for all 15 invalid sentences and can produce parse tree visualizations for all 20 sentences used for prototype testing.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli by Dzulkifli, Muhammad Zulhilmie

    Published 2021
    “…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A novel neuroscience-inspired architecture: for computer vision applications by Hassan, Marwa Yousif, Khalifa, Othman Omran, Abu Talib, Azhar, Olanrewaju, Rashidah Funke, Hassan Abdalla Hashim, Aisha

    Published 2016
    “…The validation of the proposed model was conducted using “Shape” feature dimension. The results show up to 2% accuracy rate compared to our implementation of DeepFace, a high performing face recognition algorithm that was developed by Facebook, is achieved under the same hardware/ software conditions; and we were able to speed up the training up to 21% per a training patch compared to DeepFace.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    A secure message handler using microsoft cryptoapi by Eh Kan, Chessda Uttraphan

    Published 2003
    “…This dll file serves as a reference for any Visual Basic application which needs to call the CtyptoAPI function. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    A secure message handler using microsoft cryptoapi by Eh Kan, Chessda Uttraphan

    Published 2003
    “…This dll file serves as a reference for any Visual Basic application which needs to call the CtyptoAPI function. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems by Paniandi, Arul

    Published 2006
    “…Embedded C language codes are then written to test the functionality of the RSA co-processor on hardware. Upon verification, a demonstration application prototype that performs RSA encryption and decryption is developed using Visual Basic 6.0. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Augmented reality monitoring system for cross-belt conveyor in advanced automation line / Sukarnur Che Abdullah ... [et al.] by Che Abdullah, Sukarnur, Amari, Mohamad Dzulhelmy, Mat Jusoh, Mohammad Azzeim, Amirudin, Irfan Syahmi Rusyaidi, Zainalabidin, Ashraf

    Published 2025
    “…This motivates our initiative to develop a simulation of a cross-belt conveyor system. The algorithms for the conveyor system were implemented using C# within Visual Studio and Unity environments. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions by Abbas, Iraq Tareq

    Published 2018
    “…The second technique is to solve bi-objective functions by using the BOBAT algorithm. The third technique is an integration of BOGSA with BOBAT to produce a BOGSBAT algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Cars detection in stitched image using morphological approach by Joselyn, Jok.

    Published 2017
    “…Related algorithms using mathematical approach such as alpha blending will be implemented in the project to enhance the image stitching method for a better quality stitched image. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  16. 16

    FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources by Al-Qadhi, Abdulrahman K., Athauda, Rukshan, Latip, Rohaya, Hussin, Masnida

    Published 2026
    “…We have evaluated the FaaSBid model and the proposed algorithms and pricing model by comparing with a number of existing models and algorithms using real-world datasets. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    An efficient computation technique for cryptosystems based on Lucas functions by Md Ali, Zulkarnain, Othman, Mohamed, Md. Said, Mohamad Rushdan, Sulaiman, Md. Nasir

    Published 2008
    “…We have found that the binary sequence used in a new algorithm is shorter than a special sequence used in an existing algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Comparison between Genetic Algorithm and Prey-Predator Algorithm. by Ong, Hong Choon

    “…We introduce a new metaheuristic algorithm inspired by prey-predator interaction of animals. …”
    Get full text
    Monograph
  19. 19

    Development of a novel fault management in distribution system using distribution automation system in conjunction with GSM communication by Ab Ghani, Mohd Ruddin, Mat Hanafiah, Mohd Ariff, Raman, Siti Hajar, Wan Jusoh, Wan Nor Shela Ezwane, Baharudin, Zikri Abadi

    Published 2013
    “…The system has been equipped with current sensor as field data interface devices, microcontroller as remote terminal unit, GSM as communication network, computer as master terminal unit and visual basic as human interface (HMI) software. …”
    Get full text
    Get full text
    Article
  20. 20

    Enhancing speed performance of the cryptographic algorithm based on the lucas sequence by M. Abulkhirat, Esam

    Published 2003
    “…Reducing the calculation time of the algorithm, in sequential and parallel platforms, using the doubling-rule technique combined with a new scheme led to a strong improvement of the LUC algorithm speed. …”
    Get full text
    Get full text
    Thesis