Search Results - (( developing formative source algorithm ) OR ( java implementation path algorithm ))
Search alternatives:
- developing formative »
- java implementation »
- implementation path »
- formative source »
- source algorithm »
- path algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Virtual manufacturing for prediction of Martensite Formation and Hardness Value induced by Laser Welding Process using Subroutine Algorithm in MSC Marc/Mentat / Omar Yahya...[et al...
Published 2018“…It can be concluded that the algorithms to model the heat source and to calculate the cooling time t8/5 are successfully developed and implemented. …”
Get full text
Get full text
Get full text
Article -
6
Developement of 3D virtual environment for Teratai College, UiTM Shah Alam using open source platform / Tengku Mohd Najib Tengku Ishak
Published 2006“…Another objective is to implement the virtual environment visit using open source platform which perhaps may generates more 3D project using open source platform. …”
Get full text
Get full text
Thesis -
7
Software Development For Conversion Of Ip To Wireless Atm (Watm)
Published 2002“…In this thesis, we propose the conversion algorithm that leads to a WATM packet assuming to use the TCP/IP protocol as the source. …”
Get full text
Get full text
Thesis -
8
Enhanced Instantaneous Power Theory with average algorithm for indirect current controlled three-level inverter-based shunt active power filter under dynamic state conditions
Published 2016“…The proposed algorithm is developed and evaluated in MATLAB/Simulink. …”
Get full text
Get full text
Get full text
Article -
9
Development Of Generative Computer-Aided Process Planning System For Lathe Machining
Published 2019“…To validate the generated tool-path, G-codes generated in media package file (MPF) file format and verified through CNC lathe machine. Indeed, the developed algorithm was able to determine the minimum unit production cost of lathe machining part model. …”
Get full text
Get full text
Thesis -
10
Enhanced weight-based clustering algorithm to provide reliable delivery for VANET safety applications
Published 2019“…In this study, enhanced weight-based clustering algorithm (EWCA) was developed to address these challenges. …”
Get full text
Get full text
Article -
11
SNR Based DSDV Routing Protocol for MANET
Published 2012“…In this project the Signal-to-Noise (SNR) based routing protocol has been adapted into the standard Destination Sequenced Distance Vector (DSDV) routing algorithm by developing an algorithm to calculate the cumulative average SNR from source to destination and apply the algorithm in the DSDV routing protocol. …”
Get full text
Get full text
Get full text
Thesis -
12
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
Get full text
Get full text
Thesis -
13
Lattice-based cryptography: the dots that provide information security
Published 2023Get full text
Get full text
Get full text
Get full text
Proceedings -
14
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
15
Analysis of daytime and nighttime ground level ozone concentrations using boosted regression tree technique
Published 2017“…Results showed that the model developed was within the acceptable range and could be used to understand ozone formation and identify potential sources of ozone for estimating O3 concentrations during daytime and nighttime Results indicated that the wind speed, wind direction, relative humidity, and temperature were the most dominant variables in terms of influencing ozone formation. …”
Get full text
Get full text
Get full text
Article -
16
A new mobile malware classification for call log exploitation
Published 2024journal::journal article -
17
Reliability assessment of power system generation adequacy with wind power using population-based intelligent search methods
Published 2017“…However, this energy source differs considerably from the conventional generation sources because it is intermittent in nature and may lead to high-risk levels in the electrical system reliability. …”
Get full text
Get full text
Get full text
Thesis -
18
Trace analyzer for NS-2
Published 2023“…This layer processes the data obtain from the source and convert it to meaningful format for the third layer. …”
Conference paper -
19
Prediction of PVT properties in crude oil systems using support vector machines
Published 2023Conference paper -
20
Smart citation manager
Published 2019“…(iv) Text extraction algorithm facilitate the retrieving text from PDF document to mind map. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
