Search Results - (( develop assessing replication algorithm ) OR ( java optimization path algorithm ))
Search alternatives:
- assessing replication »
- replication algorithm »
- java optimization »
- optimization path »
- path algorithm »
- develop »
-
1
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
2
SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing
Published 2019“…This work uses iterative smoothing algorithm to find an alternative path with less distance and energy consumption. …”
Get full text
Get full text
Thesis -
3
Energy efficient path reconstruction in wireless sensor network using iPath
Published 2019“…This work uses iterative boosting algorithm to find an alternative path with less distance and energy consumption. …”
Get full text
Get full text
Get full text
Article -
4
Visdom: Smart guide robot for visually impaired people
Published 2025“…Core functionalities such as path planning, autonomous movement, voice feedback, and app-to-robot communication have been thoroughly tested and optimized. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
6
Study of hand gesture recognition using impulse radio ultra wideband (IRUWB) radar sensor
Published 2023“…Documentation of the development process ensures the methodology and findings are well-documented for reference and replication. …”
Get full text
Get full text
Get full text
Thesis -
7
-
8
Development of a hybrid machine learning model for rockfall source and hazard assessment using laser scanning data and GIS
Published 2019“…Consequently, a novel hybrid model is developed to identify potential rockfall sources in the presence of shallow landslides. …”
Get full text
Get full text
Thesis -
9
Determination of transfer capability considering risk and reliability cost/ worth assessment in dynamic and static system cascading collapses / Nur Ashida Salim
Published 2015“…The proposed research methodology involved developing an algorithm commenced with a fault occurrence and then followed by the propagation of power system component tripping events which is defined as the system cascading collapse. …”
Get full text
Get full text
Thesis -
10
Al-Istikhlāf framework in the age of artificial intelligence: reclaiming the human identity and responsibility in the digital era
Published 2025“…Drawing on Qur’ānic exegesis, classical Islamic scholarship, and contemporary AI ethics, it contrasted natural intelligence with machine computation and highlighted the unique moral, spiritual, and teleological dimensions of humanity that cannot be replicated by algorithms. The article then applied the al-Istikhlāf framework to assess AI’s impact on identity, psychology, social relations, labour, and spiritual life. …”
Get full text
Get full text
Get full text
Article -
11
Unlocking insights: A comprehensive dataset analysis on the acceptance of computational thinking skills among undergraduate university students through the lens of extended techno...
Published 2024“…This dataset stands among the pioneering efforts to assess the novel covariance-based structural equation model algorithm within SmartPLS 4, presenting a valuable resource for future research employing the same mechanism.…”
Get full text
Get full text
Get full text
Article -
12
Access control model based on trust, purpose, and role in materialized view for privacy protection
Published 2019“…Despite the recent advances in access control models, there are still issues that impede the development of effective access control. Among them is the lack of assessments for the user to authorize access, which comprises reliance on identity, purpose, and role. …”
Get full text
Get full text
Thesis
