Search Results - (( using function a algorithm ) OR ( using visual ((basic algorithm) OR (_ algorithm)) ))
Search alternatives:
- basic algorithm »
- using function »
- using visual »
- a algorithm »
- function a »
-
1
A new image scrambling technique using block rotation algorithm based on Rubik’s cube
Published 2013“…The first part of the algorithm aims to build a rotation table using hash function within scramble phase and descramble phase to generate a scrambled (rotated) image and the retrieved image. …”
Get full text
Get full text
Get full text
Article -
2
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004“…This system is implemented on a Windows platform with Visual Basic as a programming language and 3-DES as a main encryption algorithm. …”
Get full text
Get full text
Thesis -
3
Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli
Published 2021“…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. …”
Get full text
Get full text
Thesis -
4
BMTutor research design: Malay sentence parse tree visualization
Published 2014“…As a result of the lack of models and algorithms have been introduced in both parsers, the model and algorithm development phase is introduced in the design of BMTutor.Output from the development process shows that the prototype is able to provide sentence correction for all 15 invalid sentences and can produce parse tree visualizations for all 20 sentences used for prototype testing.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Ultrasonic Tomography System For Liquid/Gas Flow: Frame Rate Comparison Between Visual Basic And Visual C++ Programming
Published 2006“…By using a suitable image reconstruction algorithm, the tomogram will be interfaced with a tomography measurement system and a personal computer using Keithley DAS-1802HC interfacing card. …”
Get full text
Get full text
Get full text
Article -
6
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…Embedded C language codes are then written to test the functionality of the RSA co-processor on hardware. Upon verification, a demonstration application prototype that performs RSA encryption and decryption is developed using Visual Basic 6.0. …”
Get full text
Get full text
Thesis -
7
A secure message handler using microsoft cryptoapi
Published 2003“…This dll file serves as a reference for any Visual Basic application which needs to call the CtyptoAPI function. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
A secure message handler using microsoft cryptoapi
Published 2003“…This dll file serves as a reference for any Visual Basic application which needs to call the CtyptoAPI function. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Cars detection in stitched image using morphological approach
Published 2017“…Related algorithms using mathematical approach such as alpha blending will be implemented in the project to enhance the image stitching method for a better quality stitched image. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
10
Augmented reality monitoring system for cross-belt conveyor in advanced automation line / Sukarnur Che Abdullah ... [et al.]
Published 2025“…This motivates our initiative to develop a simulation of a cross-belt conveyor system. The algorithms for the conveyor system were implemented using C# within Visual Studio and Unity environments. …”
Get full text
Get full text
Get full text
Article -
11
Stereo vision for visual object tracking and distance measurement assessment / Sukarnur Che Abdulla...[et al.]
Published 2019“…Furthermore, the project proposes a new program algorithm for binocular vision system to work, in order to identify distance of an object with a basic equation has been derived and set in the designed algorithm. …”
Get full text
Get full text
Get full text
Article -
12
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…A tool termed as VIGA-20 (Visualization of Genetic Algorithm using 2-0 Graph) is implemented to accomplish this goal. …”
Get full text
Get full text
Thesis -
13
E-history Malaysian secondary school textbook using TF-IDF algorithm and text visualization / Nur Hafizah Mohd Ridzuan
Published 2020“…The objective of the project is to design and develop an E-History Malaysian secondary school textbook system using Term Frequency-Inverse Document Frequency (TF-IDF) algorithm with text visualization and also to test the functionality and usability of the system through a web-based system. …”
Get full text
Get full text
Thesis -
14
Web Camera Application For Motion Detection
Published 2003“…In the third stage, implementation process is done by coding the motion detection software using Microsoft Visual Basic 6.0. The algorithm that was successfully simulated is used as the reference for forming the working mechanism in creating motion detection software. …”
Get full text
Get full text
Thesis -
15
Website assurance monitoring application with MD5 Hashing and SHA-26 Algorithm / Abdullah Sani Abd Rahman and Samsiah Ahmad
Published 2022“…The Website Assurance Monitoring application has been developed based on MD5 hashing technique and SHA26 algorithm. By using Microsoft Visual Basic 6.0, the Graphical User Interfaces (GUIs) of the application to provide an easy or user-friendly monitoring application. …”
Get full text
Get full text
Get full text
Article -
16
Denosing of natural image based on non-linear threshold filtering using discrete wavelet transformation
Published 2014“…This paper treats with threshold estimation technique to reduce the noise in natural images by using on discrete wavelet transformation. Calculating the value of thresholding, the way it works in the algorithm (derivation of thresholding function) and the type of wavelet mother functions, are pivotal issues in the field of denoising based wavelet approach. …”
Get full text
Get full text
Article -
17
Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms
Published 2023“…With the use of SRBFNN-2SAT, a training method based on these algorithms has been presented, then training has been compared among algorithms, which were applied in Microsoft Visual C++ software using multiple metrics of performance, including Mean Absolute Relative Error (MARE), Root Mean Square Error (RMSE), Mean Absolute Percentage Error (MAPE), Mean Bias Error (MBE), Systematic Error (SD), Schwarz Bayesian Criterion (SBC), and Central Process Unit time (CPU time). …”
Get full text
Get full text
Get full text
Article -
18
Using Electromagnetism-like algorithm and genetic algorithm to optimize time of task scheduling for dual manipulators
Published 2023“…The movement and the configurations of the manipulators at the task points were visualized using a simulator developed via Visual Basic. …”
Conference paper -
19
Comparative Performance Analysis of Bat Algorithm and Bacterial Foraging Optimization Algorithm using Standard Benchmark Functions
Published 2014“…Owing to the fact that they are new and much of their relative performance are still unknown (as compared to other established meta-heuristic algorithms), Bacterial Foraging Optimization Algorithm (BFO) and Bat Algorithm (BA) have been adopted for comparison using the 12 selected benchmark functions. …”
Get full text
Get full text
Conference or Workshop Item -
20
Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms
Published 2023“…With the use of SRBFNN-2SAT, a training method based on these algorithms has been presented, then training has been compared among algorithms, which were applied in Microsoft Visual C++ software using multiple metrics of performance, including Mean Absolute Relative Error (MARE), Root Mean Square Error (RMSE), Mean Absolute Percentage Error (MAPE), Mean Bias Error (MBE), Systematic Error (SD), Schwarz Bayesian Criterion (SBC), and Central Process Unit time (CPU time). …”
Get full text
Get full text
Get full text
Article
