Search Results - (( development programme end algorithm ) OR ( java optimization path algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  2. 2

    SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing by Abd, Wamidh Jwdat

    Published 2019
    “…This work uses iterative smoothing algorithm to find an alternative path with less distance and energy consumption. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Energy efficient path reconstruction in wireless sensor network using iPath by Hasan, Sazlinah, Abd, Wamidh Jwdat, Ariffin, Ahmad Alauddin

    Published 2019
    “…This work uses iterative boosting algorithm to find an alternative path with less distance and energy consumption. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…Core functionalities such as path planning, autonomous movement, voice feedback, and app-to-robot communication have been thoroughly tested and optimized. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    RISC-V instruction set extension on blockchain application by Cheong , Kin Seng

    Published 2024
    “…This would greatly shorten the instructions used by the algorithms and improved the execution time of the programmes. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Making programmer effective for software development teams: An extended study by Gilal, A.R., Jaafar, J., Abro, A., Umrani, W.A., Basri, S., Omar, M.

    Published 2017
    “…In order to find the possible combination of personality types between team-leader and programmer, this study applied Genetic Algorithm (GA) and Johnson's Algorithm (JA) on data. …”
    Get full text
    Get full text
    Article
  7. 7

    Fiber-Wireless testbed using software defined radio for protocol and algorithm testing by Ridwan M.A., Mohamed Radzi N.A., Abdullah F.

    Published 2023
    “…Almost all recently proposed testbed designed for FiWi are using hardware that lacks in programmability feature, making it challenging to implement any protocols and algorithms. …”
    Article
  8. 8

    Instruction Set Extension Of A Low-End Reconfigurable Microcontroller In Bit-Sorting Implementation by Salim, Sani Irwan, Soo, Yew Guan, Samsudin, Sharatul Izah

    Published 2018
    “…The modules’ integration is implemented using instruction set architecture (ISA) extension technique and is developed on the Field Programmable Gate Array (FPGA). …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Design of a floating point unit for 32-bit 5 stage pipeline processor by Low, Wai Hau

    Published 2020
    “…The development project will start by studying the algorithm of addition on floating point numbers. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Application Specific Instruction Set Processor (ASIP) Design In An 8-Bit Softcore Microcontroller by Salim, Sani Irwan, Soo, Yew Guan, Samsudin, Sharatul Izah

    Published 2018
    “…The modules’ integration is implemented using ASIP design without occurring extra board space and is developed using the Field Programmable Gate Array (FPGA) as the single chip solutions. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Method of Moment Analysis Using Open-Ended Coaxial Sensor in Determination of Corn Reflection Coefficient by Soleimani, Hojjatollah

    Published 2010
    “…Then, the various specializations are described, accompanied with relevant references to illustrate the pitfalls and shortcomings, as well as the advantages, as compared to other methods. So finally, their algorithms are easily programmable on computer. The computation of reflection coefficient of the corn was programmed using MATLAB software for the admittance approach and Method of Moment (MOM). …”
    Get full text
    Get full text
    Thesis
  13. 13

    A Novel Approach Of Groebner Bases Computation For Safety Analysis Of Distributed Discrete Controllers by Alwi @ Suhaimi, Saifulza, Salleh, Mohd Rizal, Jaafar, Hazriq Izzuan, Ab Ghani, Mohd Ruddin, Md Fauadi, Muhammad Hafidz Fazli

    Published 2019
    “…This research also proposes the improvement of mean time to failure (MTTF) by using the new model checking method. At the end of this research, a complete tool of model checking method based on Groebner bases algorithm for safety verification will be produced. …”
    Get full text
    Get full text
    Get full text
    Technical Report
  14. 14

    The identification of high potential archers based on relative psychological coping skills variables: a support vector machine approach by Taha, Z., Musa, R.M., Majeed, A.P.P.A, Abdullah, M.R., Zakaria, M.A., Alim, M.M., Jizat, J.A.M., Ibrahim, M.F.

    Published 2018
    “…The findings of this investigation can be valuable to coaches and sports managers to recognise high potential athletes from the selected psychological coping skills variables examined which would consequently save time and energy during talent identification and development programme.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16

    The identification of high potential archers based on relative psychological coping skills variables: A Support Vector Machine approach by Zahari, Taha, Rabiu Muazu, Musa, Anwar, P. P. Abdul Majeed, Mohamad Razali, Abdullah, Muhammad Aizzat, Zakaria, Muhammad Muaz, Alim, Jessnor Arif, Mat Jizat, Mohamad Fauzi, Ibrahim

    Published 2018
    “…The findings of this investigation can be valuable to coaches and sports managers to recognise high potential athletes from the selected psychological coping skills variables examined which would consequently save time and energy during talent identification and development programme.…”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan by Adnan, -

    Published 2016
    “…Likewise, the soft programmable switches that are directly connected to the controller running atop end host servers are attractive targets for attackers to initiate control plane flooding; apart from authorized but untrusted hosts. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A smart metering for energy management system via GSM-SMS based protocol by Fakharuddin, Azhar

    Published 2011
    “…The designed system is compatible with all type of existing monitoring setups at consumer's end. The proposed monitoring system consist of a new energy calculation algorithm, offering electricity packages with a intelligent monitoring for daily power consumption connected to base-station via GSM network. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19

    Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities by Draib, Najla'a Ateeq Mohammed

    Published 2022
    “…This technique also applies the removing algorithm, which uses escaping method to remove the detected vulnerabilities. …”
    Get full text
    Get full text
    Thesis
  20. 20