Search Results - (( basic model verification algorithm ) OR ( java implementation path algorithm ))

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems by Paniandi, Arul

    Published 2006
    “…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A PLC-based Hybrid Fuzzy PID Controller for PWM-driven Variable Speed Drive by ARROFIQ, MUHAMMAD

    Published 2010
    “…A simulation model in MA TLAB/Simulink is developed using system identification technique to perform verification of the PLCbased intelligent controller of the PWM-driven VVVF algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Development and Application of a Finite Element Distributed Rainfall Runoff Simulation Model by Huang, Yuk Feng

    Published 2000
    “…A laboratory rainfall runoff physical model was set up for observation data in order to test the numerical model. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Comparison of Landsat 8, Sentinel-2 and spectral indices combinations for Google Earth Engine-based land use mapping in the Johor River Basin, Malaysia by Ju, Zeng, Tan, Mou Leong, Narimah Samat, Chang, Chun Kiat

    Published 2021
    “…The Random Forest (RF) algorithm was used to classify the land use land cover (LULC) with 222 training samples and 78 verification samples obtained through the Google Earth Pro higher resolution satellite images and field samplings. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Digital forensic investigation reduction model (DIFReM) for Windows 10 OS by Shayau, Yazid Haruna

    Published 2018
    “…We propose a data reduction model (DIFReM) and tool which will not only help the investigator in identifying modified system files but also the ability to detect files inserted into system directories and also be able to verify integrity using hashing. …”
    Get full text
    Get full text
    Thesis