Search Results - (( developing web path algorithm ) OR ( java optimization sensor algorithm ))
Search alternatives:
- optimization sensor »
- java optimization »
- sensor algorithm »
- developing web »
- path algorithm »
- web path »
-
1
Development of obstacle avoidance technique in web-based geographic information system for traffic management using open source software
Published 2014“…By using OpenLayers and PHP a web-based GIS platform was developed to ease the systems usability.…”
Get full text
Get full text
Get full text
Article -
2
-
3
Development of web-based GIS for traffic management system with obstacle avoidance technique using open source software
Published 2014“…Obstacle avoidance technique was implemented in this algorithm to avoid the congested areas. A web-based traffic management system was developed using open source software in this study. …”
Get full text
Get full text
Thesis -
4
-
5
UiTM Malaysia route planner / Mohamad Yunus Mohamed Nasir
Published 2008“…The Route Planner's core is Dijkstra's shortest-path-finding algorithm, with extensions for time dependent delays and paths constrained by travel mode. …”
Get full text
Get full text
Thesis -
6
SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing
Published 2019“…Wireless sensor networks operate through commonly self-organized sensor nodes to transfer data in a multi-hop approach to a central sink. …”
Get full text
Get full text
Thesis -
7
Energy efficient path reconstruction in wireless sensor network using iPath
Published 2019“…Wireless sensor networks operate through commonly self-organized sensor nodes to transfer data in a multi-hop approach to a central sink. …”
Get full text
Get full text
Get full text
Article -
8
-
9
-
10
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
Published 2022“…The test was conducted using eleven PHP Web applications: ten applications available on the internet and that other researchers have used and one application that the researcher developed. …”
Get full text
Get full text
Thesis
