Search Results - (( developing interactive prevention algorithm ) OR ( java optimization path algorithm ))

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  2. 2

    SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing by Abd, Wamidh Jwdat

    Published 2019
    “…This work uses iterative smoothing algorithm to find an alternative path with less distance and energy consumption. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Energy efficient path reconstruction in wireless sensor network using iPath by Hasan, Sazlinah, Abd, Wamidh Jwdat, Ariffin, Ahmad Alauddin

    Published 2019
    “…This work uses iterative boosting algorithm to find an alternative path with less distance and energy consumption. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…Core functionalities such as path planning, autonomous movement, voice feedback, and app-to-robot communication have been thoroughly tested and optimized. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Development of an effective clustering algorithm for older fallers by Goh, Choon Hian, Wong, Kam Kang, Tan, Maw Pin *, Ng, Siew Cheok, Chuah, Yea Dat, Kwan, Ban Hoe

    Published 2022
    “…The purpose of this study was, therefore, to develop a clustering-based algorithm to determine falls risk. …”
    Get full text
    Get full text
    Article
  6. 6

    Development of efficient t-way test data generation algorithm and execution strategies by Khandakar Fazley, Rabbi

    Published 2012
    “…R2Way outperforms other existing strategies but cannot support higher interaction level (T > 2). And finally, (IV) MTTG (Multi-Tuple based T-way Test Data Generation) strategy is developed inspiring kids “Card Game” to overcome the limitations of interaction strength. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Accident Prevention Block to Move an Automobile From Traffic Collision by Rajiv, Charles Samuel

    Published 2019
    “…In the present work, an attempt has been made to propose an accident prevention block in automobiles that can sense the tired/sleepy driver via a camera and algorithms, to maneuver the vehicle to safety. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  9. 9

    All-in-1 adverse drug reaction reporting system / Long Chiau Ming … [et al.] by Chiau Ming, Long, Karuppannan, Mahmathi, Abdul Wahab, Izyan, Abd Wahab, Mohd Shahezwan, Zulkifly, Hanis Hanum

    Published 2014
    “…In a later stage of this project, we could quantify the risk factors for ADR and drug interaction and develop a predictive model which links drug interaction with ADR.…”
    Get full text
    Get full text
    Get full text
    Book Section
  10. 10

    Crowd behavior monitoring using self-adaptive social force model by Wan Nur Azhani, W. Samsudin, Kamarul Hawari, Ghazali

    Published 2019
    “…This work aims to develop a crowd behavior monitoring system using Self-Adaptive SFM. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    3D Face Analysis using Tensor Approach by Suriani, Ab Rahman

    Published 2022
    “…Early studies in face research used matrix-based and vector-based algorithms to represent faces. According to studies, these methods have the potential to prevent the loss of critical and significant data, which could lead to lower recognition performance. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A conceptual anonymity model to ensure privacy for sensitive network data by Arafat, N.H.M., Pramanik, Md Ileas, Abu Jafar, Md Muzahid, Lu, Bibo, Jahan, Sumaiya, Murad, Saydul Akbar

    Published 2021
    “…The growing popularity of this industry, as well as the required development of data sharing tools and technology, pose major threats to an individual's sensitive information privacy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Monitoring cathodic protection system for underground pipeline by Thai, Seng Choong

    Published 2013
    “…In this research, a software algorithm is created to be able to sense the readings of drain point, shunt current, transformer rectifier voltage, temperature, humidity and to response to multiple levels of CP malfunctions using interactive graphical method and mapping system. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Depression Detection in Tweets from Urban Cities of Malaysia using Deep Learning by Priya Sri, E.K., Savita, K.S., Zaffar, M.

    Published 2021
    “…Therefore, the research entails on how the problem statement of this project on developing an algorithm that can predict text- based depression symptoms using deep learning and Natural Language Processing (NLP) can be achieved. …”
    Get full text
    Get full text
    Conference or Workshop Item