Search Results - (( developing formative path algorithm ) OR ( java implementation some algorithm ))
Search alternatives:
- developing formative »
- java implementation »
- implementation some »
- path algorithm »
- some algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
High Rise Building Evacuation Route Model Using DIJKSTRA'S Algorithm
Published 2015“…The objective is to design and develop an evacuation route using shortest path algorithm based on the evacuation map of the building. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
5
A new routing mechanism for energy-efficient in bluetooth mesh-low power nodes based on wireless sensor network
Published 2023“…The multi-criterion energyefficient routing mechanism uses the ACO algorithm, inspired by ants' foraging behaviour. In Bluetooth M-LPNWSN systems, virtual ants explore paths based on signal robustness, distances, and energy consumption. …”
Get full text
Get full text
Get full text
Thesis -
6
Development of Path Loss Models for Smooth and Convex Surfaces Terrains in Malaysian Environment
Published 2004“…This study describes the development of path loss prediction model for smooth and convex surfaces terrains in Malaysian environment. …”
Get full text
Get full text
Thesis -
7
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
8
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
9
Improvement and application of particle swarm optimization algorithm
Published 2025“…This method combines CPTD with the Genetic Algorithm and PSO (GAPSO), resulting in an effective strategy for dynamic formation reconfiguration and path optimization. …”
Get full text
Get full text
Article -
10
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
11
SNR Based DSDV Routing Protocol for MANET
Published 2012“…In this project the Signal-to-Noise (SNR) based routing protocol has been adapted into the standard Destination Sequenced Distance Vector (DSDV) routing algorithm by developing an algorithm to calculate the cumulative average SNR from source to destination and apply the algorithm in the DSDV routing protocol. …”
Get full text
Get full text
Get full text
Thesis -
12
Development Of Generative Computer-Aided Process Planning System For Lathe Machining
Published 2019“…Indeed, the developed algorithm was able to determine the minimum unit production cost of lathe machining part model. …”
Get full text
Get full text
Thesis -
13
General Algorithm of n-Multiple Coil Shape for Variable Links Hyper-Redundant Robotic Manipulator
Published 2011“…Meanwhile, the multiple coil shape is arranged sequentially in an elbow up and elbow down manner. An algorithm is then developed to control the links of the robot along the path so that the robot will travel in such a way that each of the follower links will take place of the earlier link‘s position. …”
Get full text
Get full text
Get full text
Proceeding Paper -
14
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
15
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis -
16
-
17
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
19
Optimal Control of Directional Drilling Process
Published 2014“…As drilling environment is getting more challenging, with deeper, high pressure high temperature formation, and rough environment, ensuring that the bit direction following the planned and desired well path is very crucial in order to penetrate the reservoir targets. …”
Get full text
Get full text
Final Year Project -
20
A microscopic swarm model simulation and fractal approach towards swarm agent behaviour
Published 2006“…The collision avoidance algorithm is influenced by existing algorithm flock which uses the steering behaviour to animate birds. …”
Get full text
Get full text
Get full text
Article
