Search Results - (( developing extraction path algorithm ) OR ( java implementation some algorithm ))
Search alternatives:
- developing extraction »
- java implementation »
- implementation some »
- extraction path »
- path algorithm »
- some algorithm »
-
1
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…The recent trend of software development uses OO paradigm. Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
2
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
3
-
4
Very Large Scale Integration Cell Based Path Extractor For Physical To Layout Mapping In Fault Isolation Work
Published 2017“…This development and study of the path extract method carries significance in areas of EDA and debug diagnosis work.…”
Get full text
Get full text
Thesis -
5
Graph processing hardware accelerator for shortest path algorithms in nanometer very large-scale integration interconnect routing
Published 2007“…This thesis proposes a graph processing hardware accelerator for shortest path algorithms applied in nanometer VLSI interconnect routing problems. …”
Get full text
Get full text
Get full text
Thesis -
6
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
7
Online Mapping-Based Navigation System for Wheeled Mobile Robot in Road Following and Roundabout
Published 2018“…In this work, the online mapping of mobile robot employing the utilization of sensor fusion technique is used to extract the road characteristics that will be used with path planning algorithm to enable the robot to move from a certain start position to predetermined goal, such as road curbs, road borders, and roundabout. …”
Get full text
Get full text
Get full text
Book Chapter -
8
STEP-NC Interpolator for General 2D and 3D Parametric Curve / Dzullijah Ibrahim...[et al.]
Published 2017“…A hierarchical-based algorithm is used to extract the tool path data from STEP-NC tool path file of a product model. …”
Get full text
Get full text
Article -
9
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
10
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
11
Developing and validating a simulation model for counting and classification of vehicles
Published 2016“…An algorithm system approach has been presented for extracting traffic data using video image processing. …”
Get full text
Get full text
Get full text
Article -
12
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
13
-
14
Feature extraction: hand shape, hand position and hand trajectory path
Published 2011Get full text
Get full text
Get full text
Book Chapter -
15
Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine
Published 2023“…Also, a corridor extraction algorithm has been developed to extract the region of interest (ROI) around the transmission towers. …”
text::Thesis -
16
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
17
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis -
18
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
20
An Investigation of Classical Model Predictive Controller Path Tracking Performance of a Two-Wheel and Four-Wheel Steering Vehicle
Published 2024“…Studies on self-driving vehicles have become a trend in recent years, and many systems have been developed to enable autonomous manoeuvre. Various methods have been used to improve path-tracking algorithms which increase vehicle performance, including tracking accuracy and stability. …”
Get full text
Get full text
Get full text
Article
