Search Results - (( _ information based algorithm ) OR ( java application path algorithm ))

Refine Results
  1. 1

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    Channel quality information (CQI) reporting algorithms in LTE-A by Ahamad Sukor, Masturah, Mohd. Ramli, Huda Adibah

    Published 2016
    “…The simulation results show that the average CQI reporting algorithm produced more compromising results than the automated CQI reporting algorithm and the average RB-based CQI reporting algorithm…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Adaptive intelligence job online scheduling within dynamic grid environment based on gridsim by Lorpunmanee, Siriluck, Md. Sap, Mohd. Noor, Abdullah, Abdul Hanan

    Published 2008
    “…Additionally, the provided common information from Grid Information Service (GIS) and an arrival new job are calculated by Fuzzy C-Means (FCM) algorithm in order· to evaluate the current status of resources and groups of arrival jobs. …”
    Get full text
    Get full text
    Article
  5. 5

    Design of information hiding algorithm for multi-link network transmission channel by Fu, Songyin, Wang, Rangding

    Published 2019
    “…This shows that the algorithm has a high accuracy in extracting secret information. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A review on the graphical user authentication algorithm : recognition-based and recall-based. by Ugochukwu, Ejike Ekeke Kingsley, Jusoh, Yusmadi Yah

    Published 2013
    “…User authentication has become an important consideration in information security as traditional password-based schemes are constantly subjected to attacks. …”
    Get full text
    Get full text
    Article
  7. 7

    MGR: An Information Theory Based Hierarchical Divisive Clustering Algorithm for Categorical Data by Hongwu, Qin, Ma, Xiuqin, Herawan, Tutut, Jasni, Mohamad Zain

    Published 2014
    “…This research proposes mean gain ratio (MGR), a new information theory based hierarchical divisive clustering algorithm for categorical data. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias by Alias, Nur Farehah

    Published 2017
    “…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION by Adi, Waskito

    Published 2011
    “…The design of the proposed framework involves haptic texture rendering algorithm and query algorithm. The proposed framework integrates computer haptic and content based image retrieval (CBIR) where haptic texture rendering is performed based on extracted cloth data. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…The results show that the extraction algorithm has been able to extract 100 % of the information correctly. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan by Mohd Amdan, Muhammad Awwab

    Published 2014
    “…El-gamal encryption system is an asymmetric key encryption algorithm which is based on the Diffie-Hellman key exchange. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Designing New Block Cipher Based On Genetic Algorithm Approach by Nur Hafiza Binti Zakaria, Ramlan Mahmod, Nur Izura Udzir, Zuriati Ahmad Zukarnain, Suriyani Ariffin

    Published 2024
    “…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
    Article
  16. 16

    Hybrid group decision making method based on multi-granular information using fusion algorithms and consistent fuzzy preference relation / Siti Amnah Mohd Ridzuan by Mohd Ridzuan, Siti Amnah

    Published 2017
    “…Two new decision making models have been developed in this study, the first is the combination of multi-granular linguistic information using fusion algorithm and consistent fuzzy preference relations (CFPR) and the second one is the combination of multi-granular uncertain linguistic information and consistent linguistic fuzzy preference relations (CLFPR) to cater this problem. …”
    Get full text
    Get full text
    Thesis
  17. 17

    An adaptive density-based method for clustering evolving data streams / Amineh Amini by Amini, Amineh

    Published 2014
    “…This study proposes a density-based algorithm for clustering evolving data streams. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection by Siswanto, Apri, Katuk, Norliza, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Tag clouds algorithm with the inclusion of personality traits by Ahmad Affandi, Supli

    Published 2015
    “…This algorithm is beneficial for decision making using information visualization in which personality traits of the user are heavily inclined. …”
    Get full text
    Get full text
    Get full text
    Thesis