Search Results - (( filing implementation modified algorithm ) OR ( java optimization path algorithm ))

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security by H. Belgassem, Seddeq

    Published 2004
    “…The computation results show that the key generation process using the modified algorithm is around three times faster than the old implementation. …”
    Get full text
    Get full text
    Thesis
  3. 3

    SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing by Abd, Wamidh Jwdat

    Published 2019
    “…This work uses iterative smoothing algorithm to find an alternative path with less distance and energy consumption. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Energy efficient path reconstruction in wireless sensor network using iPath by Hasan, Sazlinah, Abd, Wamidh Jwdat, Ariffin, Ahmad Alauddin

    Published 2019
    “…This work uses iterative boosting algorithm to find an alternative path with less distance and energy consumption. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…Core functionalities such as path planning, autonomous movement, voice feedback, and app-to-robot communication have been thoroughly tested and optimized. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Chinese character recognition using neural network / Low Poh Tian by Low, Poh Tian

    Published 2003
    “…The extracted image data is then feed into the network, the weights of which are modified by error-backpropagation algorithm. The network has successfully been train to the error tolerance of 0.0001. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Potential field methods and their inherent approaches for path planning by Omar, Rosli, Sabudin, E. N, C. K., Che Ku Melor, A., N. H

    Published 2016
    “…This paper reviews the traditional artificial potential field theory that has been modified with variety of algorithms based on potential field method that have been implemented to upgrade the potential function performance in obstacle avoidance and local minima problem.…”
    Get full text
    Get full text
    Article
  9. 9

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Development Of Distributed Grid-Based Hydrological Model And Floodplain Inundation Management System by Al_Fugara, A’kif Mohammed Salem

    Published 2008
    “…The analysis has considered the river system with and without Stormwater Management and Road Tunnel (SMART) project, which involve structural flood mitigations measures including retention ponds, bypass tunnel and flow diversions, where the river physical condition was modified accordingly. Hourly data for flow were created into compatible MIKE11 time series in a separate file as input to the parameter editors. …”
    Get full text
    Get full text
    Thesis