Search Results - (( developing inter detection algorithm ) OR ( java implementation path algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Moving detection using cellular neural network (CNN) by Prema Latha, Subramaniam

    Published 2008
    “…The algorithm created is used to detect the ball in the images. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    Cloudids: Cloud Intrusion Detection Model Inspired By Dendritic Cell Mechanism by Azuan Ahmad, Norbik Bashah Idris, Mohd Nazri Kama

    Published 2024
    “…The experiments show that the Cloud IDS model based on Dendritic Cell algorithm able to identify and detect novel threat that targeting Cloud environment.…”
    Article
  7. 7
  8. 8

    Detection of Epileptic EEG Signal Using Wavelet Transform and Adaptive Neuro-Fuzzy Inference System by Khosropanah, Pegah

    Published 2011
    “…Such algorithms use brain electrical activity signals called electro encephalography (EEG) and have 2 methods of detection: visual (by specialist inspection) and automatic (by using signal processing knowledge). …”
    Get full text
    Get full text
    Thesis
  9. 9

    Projected majorized-correlation technique for noise filtering and accuracy in orthogonal frequency division multiplexing by Alsaadi, Alaa Abdullah Mohammed

    Published 2020
    “…One of the important factor is related to oscillator itself which generates the carrier signals and causes Inter Channel Interference Noise (ICI). The second main factor is a multipath fading channel which causes a delay in OFDM signal and results for Inter Symbol Interference Noise (ISI).Basically, phase noise is considered as main problem that causes significant degradation in detecting packet-based OFDM signals. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Automated detection and evaluation of ischemic stroke on ct brain imaging using machine learning techniques by Sharuddin, Nur Amirah Atikah

    Published 2025
    “…This study investigates the application of machine learning algorithms for the detection of ischemic stroke using CT brain images. …”
    Get full text
    Get full text
    Monograph
  11. 11

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Multi-sensor fusion and deep learning framework for automatic human activity detection and health monitoring using motion sensor data / Henry Friday Nweke by Henry Friday , Nweke

    Published 2019
    “…However, analysis of mobile and wearable sensor data for human activity detection is still very challenging. This is further worsen by the use of single sensors modality and machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Advances in remote sensing technology, machine learning and deep learning for marine oil spill detection, prediction and vulnerability assessment by Yekeen, S.T., Balogun, A.-L.

    Published 2020
    “…The scope of previous reviews is extended by covering the inter-related dimensions of detection, discrimination, and trajectory prediction of oil spills for vulnerability assessment. …”
    Get full text
    Get full text
    Article
  14. 14

    Optimising acoustic features for source mobile device identification using spectral analysis techniques / Mehdi Jahanirad by Mehdi , Jahanirad

    Published 2016
    “…To determine the source of the audio several techniques have been developed. Those techniques work by identifying the acquisition device’s fingerprint as the detection features. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing by Jamal, Fara

    Published 2021
    “…During a security attack, the MTTD for the existing solution was very high because the existing scheme could not detect the attack. For the proposed scheme, the MTTD was very low which is 4.89 minutes, because of the consensus algorithm. …”
    Get full text
    Get full text
    Thesis