Search Results - (( filing implementation modified algorithm ) OR ( java implementation path algorithm ))
Search alternatives:
- implementation modified »
- filing implementation »
- java implementation »
- implementation path »
- path algorithm »
-
1
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…The computation results show that the key generation process using the modified algorithm is around three times faster than the old implementation. …”
Get full text
Get full text
Thesis -
2
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
3
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
4
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
6
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
7
Chinese character recognition using neural network / Low Poh Tian
Published 2003“…The extracted image data is then feed into the network, the weights of which are modified by error-backpropagation algorithm. The network has successfully been train to the error tolerance of 0.0001. …”
Get full text
Get full text
Thesis -
8
Potential field methods and their inherent approaches for path planning
Published 2016“…This paper reviews the traditional artificial potential field theory that has been modified with variety of algorithms based on potential field method that have been implemented to upgrade the potential function performance in obstacle avoidance and local minima problem.…”
Get full text
Get full text
Article -
9
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
10
Development Of Distributed Grid-Based Hydrological Model And Floodplain Inundation Management System
Published 2008“…The analysis has considered the river system with and without Stormwater Management and Road Tunnel (SMART) project, which involve structural flood mitigations measures including retention ponds, bypass tunnel and flow diversions, where the river physical condition was modified accordingly. Hourly data for flow were created into compatible MIKE11 time series in a separate file as input to the parameter editors. …”
Get full text
Get full text
Thesis
