Search Results - (( developing nation using algorithm ) OR ( java optimization path algorithm ))
Search alternatives:
- java optimization »
- optimization path »
- using algorithm »
- path algorithm »
- nation using »
-
1
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
2
SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing
Published 2019“…This work uses iterative smoothing algorithm to find an alternative path with less distance and energy consumption. …”
Get full text
Get full text
Thesis -
3
Energy efficient path reconstruction in wireless sensor network using iPath
Published 2019“…This work uses iterative boosting algorithm to find an alternative path with less distance and energy consumption. …”
Get full text
Get full text
Get full text
Article -
4
Visdom: Smart guide robot for visually impaired people
Published 2025“…Core functionalities such as path planning, autonomous movement, voice feedback, and app-to-robot communication have been thoroughly tested and optimized. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
6
Automated tournament management system with dynamic matchmaking using genetic algorithm / Wan Muhammad Aqil Wan Harun
Published 2016“…Actives such as observation, interview and questionnaire has been done to gather the requirements for developing the system. CTMS are embedded with dynamic match making using genetic algorithm that can pairs players based on variation combination of criteria such as player’s gender, points and nation. …”
Get full text
Get full text
Thesis -
7
Designing and Developing an Intelligent Congkak
Published 2011“…and “Can Min-Max algorithm (MM) be speeded up by using NN as a forward-pruning method?”. …”
Get full text
Get full text
Get full text
Thesis -
8
A new 128-bit block cipher
Published 2009“…The existence of this new 128-bit block cipher algorithm will increase the protection of the national information infrastructure and also will contribute as an alternative to other cryptographic algorithms in security in the computing industry.…”
Get full text
Get full text
Thesis -
9
CAR LICENSE PLATE RECOGNITION BY USING TEMPLATE MATCHING ALGORITHM
Published 2015Get full text
Get full text
Proceeding -
10
Optimal charging strategy for plug-in hybrid electric vehicle using evolutionary algorithm
Published 2016“…An optimal charging strategy for plug-in hybrid electric vehicle (PHEV) is proposed and developed by using evolutionary algorithm to obtain the most suitable charging condition for each PHEV charging. …”
Get full text
Get full text
Undergraduates Project Papers -
11
-
12
Develpoment of combinatorial optimisation for cutting tool path strategy
Published 2009Get full text
Get full text
Conference or Workshop Item -
13
Genetic Algorithm for Forecasting Bioinformatic Outcomes of Mutation-induced Cowpeas for Sustainable Development
Published 2023“…The aim of this work is to address malnutrition, immune deficiency, hunger, and poverty as canvassed in United Nations Sustainable Development Goals 1 and 2 (SDGs 1 and 2). …”
Get full text
Get full text
Get full text
Article -
14
Secure mobile AES encryptor (SMAE)
Published 2016“…The purpose of this project is to identify a way to develop a mobile web application for the encryption and decryption of files using the 256 –bit Advanced Encryption Standard (AES) encryption algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
15
-
16
Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method
Published 2020“…This algorithm is generally used to validate identification numbers such as IMEI, debit/credit card numbers, social security numbers, national identification numbers etc. …”
Get full text
Get full text
Journal -
17
Analysis and Modification of Grain - 128 Stream Cipher Algorithm
Published 2024thesis::master thesis -
18
-
19
Adaptive emergency evacuation centre management for dynamic relocation of flood victims using firefly algorithm
Published 2016“…This study undergoes two main phases; development of algorithm and models, and development of a web-based and mobile app. …”
Get full text
Get full text
Get full text
Article -
20
An Email to Readable Vietnamese Text Conversion Algorithm for Use in TTS Application
Published 2020“…In this context, recently developed engines such as FPT.AI serves well local customers since it supports well the national language. …”
Get full text
Get full text
Conference or Workshop Item
