Search Results - (( developing transaction based algorithm ) OR ( java implementation path algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A novel deadlock detection algorithm for neighbour replication on grid environment by Noriyani, Mohd Zin

    Published 2012
    “…The NRGDD is compared with Multi-Cycle of Deadlock Detection and Recovery (MC2DR) algorithm based on the time required for both models to detect two deadlock cycles and using different numbers of transactions. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Development of a Web Access Control Technique Based User Access Behavior by Abdelrahman, Selmaelsheikh

    Published 2004
    “…This thesis discusses about designs and develops techniques and algorithms for performing web access control. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9
  10. 10

    Price prediction model of green building based on machine learning algorithms / Nur Syafiqah Jamil by Jamil, Nur Syafiqah

    Published 2021
    “…In addition, this research also develops price prediction model using Machine Learning Model based on green building datasets covering the District of Kuala Lumpur, Malaysia. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Enhanced kiosks mapping on traditional market using Apriori Algorithm / Ardiansyah Dores, and Tazkiyah Herdi by Dores, Ardiansyah, Hasani, Rifqi, Herdi, Tazkiyah

    Published 2021
    “…The results in the F1 process with the 30 thresholds, obtained 6 categories, up to the F3 process with the determination of the 20 thresholds, obtained 3 categories. Based on the results of research in accelerate the process of forming item-set combinations of transactions. …”
    Get full text
    Get full text
    Book Section
  12. 12
  13. 13

    A security payment model for financial payment using mykad by Ahmad Zahari, Nurul Huda

    Published 2011
    “…ARSA will automatically change its security algorithm based on times and attacks. If there is no attack or intrusion detected, MPM will wait for the scheduled switching within 30 minutes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Managing Heterogeneous Database Replication Using Persistence Layer Synchronous Replication (PLSR) by Noraziah, Ahmad, Abdalla, Ahmed N., Beg, Abul Hashem

    Published 2013
    “…The main objective of this algorithm is to develop an adaptive persistence layer which consisted of reliable and smooth replication. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Blockchain-enabled cybersecurity framework for healthcare domain by Islam, Md Shohidul

    Published 2025
    “…It also formulates the algorithms for the development of the proposed blockchain-enabled healthcare framework and evaluates its performance in data transaction management through simulation. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Diamond price prediction using random forest algorithm / Nur Amirah Mohd Azmi by Mohd Azmi, Nur Amirah

    Published 2025
    “…Some of the broad steps of methodology involve data preprocessing, by means of which handling of missing values, outliers, and inconsistencies for quality were developed. Development for a customized Random Forest-based model and a library-based one is performed. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20