Search Results - (( developing transaction based algorithm ) OR ( java implementation path algorithm ))
Search alternatives:
- developing transaction »
- java implementation »
- implementation path »
- transaction based »
- path algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
A novel deadlock detection algorithm for neighbour replication on grid environment
Published 2012“…The NRGDD is compared with Multi-Cycle of Deadlock Detection and Recovery (MC2DR) algorithm based on the time required for both models to detect two deadlock cycles and using different numbers of transactions. …”
Get full text
Get full text
Thesis -
6
Development of a Web Access Control Technique Based User Access Behavior
Published 2004“…This thesis discusses about designs and develops techniques and algorithms for performing web access control. …”
Get full text
Get full text
Thesis -
7
Online Transaction Fraud Detection Using Backlogging On E-Commerce Website: A Review
Published 2024Article -
8
African Buffalo Optimization Algorithm Based T-Way Test Suite Generation Strategy for Electronic-Payment Transactions
Published 2021Get full text
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
African buffalo optimization algorithm based t-way test suite generation strategy for electronic-payment transactions
Published 2022Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Price prediction model of green building based on machine learning algorithms / Nur Syafiqah Jamil
Published 2021“…In addition, this research also develops price prediction model using Machine Learning Model based on green building datasets covering the District of Kuala Lumpur, Malaysia. …”
Get full text
Get full text
Thesis -
11
Enhanced kiosks mapping on traditional market using Apriori Algorithm / Ardiansyah Dores, and Tazkiyah Herdi
Published 2021“…The results in the F1 process with the 30 thresholds, obtained 6 categories, up to the F3 process with the determination of the 20 thresholds, obtained 3 categories. Based on the results of research in accelerate the process of forming item-set combinations of transactions. …”
Get full text
Get full text
Book Section -
12
-
13
A security payment model for financial payment using mykad
Published 2011“…ARSA will automatically change its security algorithm based on times and attacks. If there is no attack or intrusion detected, MPM will wait for the scheduled switching within 30 minutes. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Reusability techniques in load-flow analysis computer program
Published 2004Get full text
Get full text
Article -
15
Managing Heterogeneous Database Replication Using Persistence Layer Synchronous Replication (PLSR)
Published 2013“…The main objective of this algorithm is to develop an adaptive persistence layer which consisted of reliable and smooth replication. …”
Get full text
Get full text
Get full text
Article -
16
-
17
Blockchain-enabled cybersecurity framework for healthcare domain
Published 2025“…It also formulates the algorithms for the development of the proposed blockchain-enabled healthcare framework and evaluates its performance in data transaction management through simulation. …”
Get full text
Get full text
Thesis -
18
Diamond price prediction using random forest algorithm / Nur Amirah Mohd Azmi
Published 2025“…Some of the broad steps of methodology involve data preprocessing, by means of which handling of missing values, outliers, and inconsistencies for quality were developed. Development for a customized Random Forest-based model and a library-based one is performed. …”
Get full text
Get full text
Thesis -
19
-
20
