Search Results - (( integer improving information algorithm ) OR ( java implementation path algorithm ))

Refine Results
  1. 1

    Efficient Big Integer Multiplication and Squaring Algorithms for Cryptographic Applications by Jahani, Shahram, Samsudin, Azman, Subramanian, Kumbakonam Govindarajan

    Published 2014
    “…In this paper, we introduce new symbols extracted from binary representation of integers called Big-ones.We present a modified version of the classicalmultiplication and squaring algorithms based on the Big-ones to improve the efficiency of big integermultiplication and squaring in number theory based cryptosystems. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Problem restructuring in interger programming for reduct searching by Ungku Chulan, Ungku Azmi Iskandar

    Published 2003
    “…Standard Integer Programming / Decision Related Integer Programming (SIP/DRIP) is a reduct searching system that finds the reducts in an information system. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Taguchi's T-method with nearest integer-based binary bat algorithm for prediction by Marlan Z.M., Jamaludin K.R., Ramlie F., Harudin N.

    Published 2023
    “…In this paper, a swarm-based binary bat optimization algorithm with a nearest integer discretization approach is integrated with the Taguchi�s T-method. …”
    Article
  11. 11

    3D Openjpeg2000 With Integer KLT by Mamat, Shahrul Azmam

    Published 2018
    “…The compression and decompression algorithm include in Integer Karhunen-Loève Theorem (Integer KLT) which efficient in spectral decorrelation and OpenJPEG2000 is a suitable for spatial decorrelation. …”
    Get full text
    Get full text
    Monograph
  12. 12

    Statistical modelling of time series of counts for a new class of mixture distributions / Khoo Wooi Chen by Khoo, Wooi Chen

    Published 2016
    “…Nevertheless, the hunt for better models is still ongoing due to the need to improve or sharpen the statistical analysis. This thesis proposes a new mixture model, the mixture of Pegram and thinning integer-valued autoregressive (MPT) processes, which is the combination of current discrete-valued time series operators. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Key generation technique based on triangular coordinate extraction for hybrid cubes by Mushtaq, Muhammad Faheem, Jamel, Sapiee, Mohamad, Kamaruddin Malik, Ahmad Khalid, Shamsul Kamal, Mat Deris, Mustafa

    Published 2017
    “…Cryptographic algorithms play an important role in information security where it ensures the security of data across the network or storage. …”
    Get full text
    Get full text
    Article
  14. 14

    Propositional satisfiability method in rough classification modeling for data mining by Abu Bakar, Azuraliza

    Published 2002
    “…The fundamental problem in data mining is whether the whole information available is always necessary to represent the information system (IS). …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Programming Approach in Teaching Operations Research Techniques for Computer Science Students by Maarop, Nurazean, Masrom, Maslin

    Published 2005
    “…OR techniques include among others, linear programming, non-linear programming, integer programming, data analysis including statistics, simulation, and goal programming. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    A Framework for Green Energy Resources Identification and Integration Supported by Real-Time Monitoring, Control, and Automation Applications by Far Chen, Jong

    Published 2025
    “…Following site identification, an improved Geographical Information System-driven fuzzy Traveling Salesman Problem-Binary Integer Programming algorithm was proposed to integrate these sites into a reliable ring-based system topology, aiming to achieve a zero-carbon footprint. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis