Search Results - (( using function ((a algorithm) OR (new algorithm)) ) OR ( basic visualization system algorithm ))
Search alternatives:
- visualization system »
- basic visualization »
- system algorithm »
- using function »
- new algorithm »
- a algorithm »
-
1
Stereo vision for visual object tracking and distance measurement assessment / Sukarnur Che Abdulla...[et al.]
Published 2019“…Furthermore, the project proposes a new program algorithm for binocular vision system to work, in order to identify distance of an object with a basic equation has been derived and set in the designed algorithm. …”
Get full text
Get full text
Get full text
Article -
2
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004“…This system is implemented on a Windows platform with Visual Basic as a programming language and 3-DES as a main encryption algorithm. …”
Get full text
Get full text
Thesis -
3
Web Camera Application For Motion Detection
Published 2003“…In the third stage, implementation process is done by coding the motion detection software using Microsoft Visual Basic 6.0. The algorithm that was successfully simulated is used as the reference for forming the working mechanism in creating motion detection software. …”
Get full text
Get full text
Thesis -
4
Ultrasonic Tomography System For Liquid/Gas Flow: Frame Rate Comparison Between Visual Basic And Visual C++ Programming
Published 2006“…By using a suitable image reconstruction algorithm, the tomogram will be interfaced with a tomography measurement system and a personal computer using Keithley DAS-1802HC interfacing card. …”
Get full text
Get full text
Get full text
Article -
5
Website assurance monitoring application with MD5 Hashing and SHA-26 Algorithm / Abdullah Sani Abd Rahman and Samsiah Ahmad
Published 2022“…Time consuming and growing of websites complexity is additional reasons of the inadequate website assurance. This paper presents a new framework for websites integrity assurance through a website monitoring application. …”
Get full text
Get full text
Get full text
Article -
6
BMTutor research design: Malay sentence parse tree visualization
Published 2014“…As a result of the lack of models and algorithms have been introduced in both parsers, the model and algorithm development phase is introduced in the design of BMTutor.Output from the development process shows that the prototype is able to provide sentence correction for all 15 invalid sentences and can produce parse tree visualizations for all 20 sentences used for prototype testing.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli
Published 2021“…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. …”
Get full text
Get full text
Thesis -
8
A novel neuroscience-inspired architecture: for computer vision applications
Published 2016“…The validation of the proposed model was conducted using “Shape” feature dimension. The results show up to 2% accuracy rate compared to our implementation of DeepFace, a high performing face recognition algorithm that was developed by Facebook, is achieved under the same hardware/ software conditions; and we were able to speed up the training up to 21% per a training patch compared to DeepFace.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
A secure message handler using microsoft cryptoapi
Published 2003“…This dll file serves as a reference for any Visual Basic application which needs to call the CtyptoAPI function. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
A secure message handler using microsoft cryptoapi
Published 2003“…This dll file serves as a reference for any Visual Basic application which needs to call the CtyptoAPI function. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…Embedded C language codes are then written to test the functionality of the RSA co-processor on hardware. Upon verification, a demonstration application prototype that performs RSA encryption and decryption is developed using Visual Basic 6.0. …”
Get full text
Get full text
Thesis -
12
Augmented reality monitoring system for cross-belt conveyor in advanced automation line / Sukarnur Che Abdullah ... [et al.]
Published 2025“…This motivates our initiative to develop a simulation of a cross-belt conveyor system. The algorithms for the conveyor system were implemented using C# within Visual Studio and Unity environments. …”
Get full text
Get full text
Get full text
Article -
13
A block cipher based on genetic algorithm
Published 2016“…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
Get full text
Get full text
Get full text
Thesis -
14
Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions
Published 2018“…The second technique is to solve bi-objective functions by using the BOBAT algorithm. The third technique is an integration of BOGSA with BOBAT to produce a BOGSBAT algorithm. …”
Get full text
Get full text
Thesis -
15
Cars detection in stitched image using morphological approach
Published 2017“…Related algorithms using mathematical approach such as alpha blending will be implemented in the project to enhance the image stitching method for a better quality stitched image. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
16
FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources
Published 2026“…We have evaluated the FaaSBid model and the proposed algorithms and pricing model by comparing with a number of existing models and algorithms using real-world datasets. …”
Get full text
Get full text
Get full text
Article -
17
An efficient computation technique for cryptosystems based on Lucas functions
Published 2008“…We have found that the binary sequence used in a new algorithm is shorter than a special sequence used in an existing algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
18
Comparison between Genetic Algorithm and Prey-Predator Algorithm.
“…We introduce a new metaheuristic algorithm inspired by prey-predator interaction of animals. …”
Get full text
Monograph -
19
Development of a novel fault management in distribution system using distribution automation system in conjunction with GSM communication
Published 2013“…The system has been equipped with current sensor as field data interface devices, microcontroller as remote terminal unit, GSM as communication network, computer as master terminal unit and visual basic as human interface (HMI) software. …”
Get full text
Get full text
Article -
20
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
Published 2003“…Reducing the calculation time of the algorithm, in sequential and parallel platforms, using the doubling-rule technique combined with a new scheme led to a strong improvement of the LUC algorithm speed. …”
Get full text
Get full text
Thesis
