Search Results - (( _ evacuation methods algorithm ) OR ( java application using algorithm ))
Search alternatives:
- evacuation methods »
- methods algorithm »
- java application »
- using algorithm »
-
1
High Rise Building Evacuation Route Model Using DIJKSTRA'S Algorithm
Published 2015“…This research aims to assist the evacuees to find the shortest path in a high rise building using a shortest path algorithm. The objective is to design and develop an evacuation route using shortest path algorithm based on the evacuation map of the building. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Simulation method of shortest and safest path algorithm for evacuation in high rise building
Published 2014“…The objectives of this research are to identify the suitable shortest and safest path algorithm for evacuation, and followed by design and develop an evacuation preparedness model simulation via shortest path algorithm to choose a suitable exit route to evacuate the evacuees. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Firefly Algorithm for adaptive emergency evacuation center management
Published 2016“…Flood disaster is among the most devastating natural disasters in the world, claiming more lives and causing property damage.The pattern of floods across all continents has been changing, becoming more frequent, intense and unpredictable for local communities.Due to unforeseen scenarios, some evacuation centers that host the flood victims may also be drowned.Hence, prime decision making is required to relocate the victims and resources to a safer center.This study proposes a Firefly Algorithm (FA) to be employed in an emergency evacuation center management. …”
Get full text
Get full text
Get full text
Article -
4
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
5
-
6
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
7
Optimizing the Social Force Model Using New Hybrid WOABAT-IFDO in Crowd Evacuation in Panic Situation
Published 2022“…Finally, validation is conducted based on the proposed crowd evacuation simulation time, which is further based on standard evacuation guidelines and statistical analysis methods.…”
Get full text
Get full text
Get full text
Proceeding -
8
-
9
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
11
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
ADAPTIVE MOTION ESTIMATION ALGORITHM FOR CROWDED SCENES
Published 2015“…Most of this method depends on optical flow and background subtraction. …”
Get full text
Get full text
Thesis -
13
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
14
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
15
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
-
17
Route Optimization System
Published 2005“…The method used to develop this project is Rapid Application Development (RAD). …”
Get full text
Get full text
Final Year Project -
18
Human evacuation movement simulation model: Concepts and techniques
Published 2022“…A program with a running algorithm of a computer model is called a computer simulation. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Human evacuation movement simulation model: Concepts and techniques
Published 2022“…A program with a running algorithm of a computer model is called a computer simulation. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Secure Image Steganography Using Encryption Algorithm
Published 2016“…Diffie-Hellman algorithm is used to determine the pixel on an image that will be used to store the message. …”
Get full text
Get full text
Conference or Workshop Item
