Search Results - (( its implementation drops algorithm ) OR ( java implementation path algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5

    QoS evaluation of different TCPs congestion control algorithm using NS2 by Tarmizi, M., Albagul, A., Khalifa, Othman Omran, Wahyudi, Martono

    Published 2006
    “…To achieve this, the users implement a flow control algorithm that controls the rate at which data packets are sent into the Internet. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    IWDSA: a hybrid Intelligent Water Drops with a Simulated Annealing for the localization improvement in wireless sensor networks by Gumaida, Bassam, Ibrahim, Adamu Abubakar

    Published 2024
    “…The proposed algorithm, named Intelligent Water Drops with Simulated Annealing (IWDSA), combines two powerful optimization methods: Intelligent Water Drops (IWD) and Simulated Annealing (SA). …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    An enhanced congestion control algorithm for LEO satellite networks by Ayob, Fahrul Hakim, Subramaniam, Shamala, Othman, Mohamed, Zulkarnain, Zuriati

    Published 2018
    “…In this research, there is a potential for TCP WestwoodNew to be improved by increasing its throughput and implemented in satellite networks. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment by Perumal, Thinagaran

    Published 2011
    “…Besides, this algorithm provides home users or application developers to implement their own event operators with bespoke syntax for their application purpose by defining cross-events corresponding to the event operators. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Adaptive unified neural network for dynamic power quality compensation by Ghazanfarpour, Behzad, Mohd Radzi, Mohd Amran, Mariun, Norman, Shoorangiz, Reza

    Published 2013
    “…For compensating the fault, another controller plant is implemented that uses Levenberg-Marquardt backpropagation algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Simulated Kalman Filter algorithms for solving optimization problems by Nor Hidayati, Abdul Aziz

    Published 2019
    “…Its optimality has inspired the development of a metaheuristic algorithm called Heuristic Kalman Algorithm (HKA) in 2009. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Real-Time Implementation Of LPC-10 Codec On TMS320C6713 DSP by Talib Alshammari, Wissam

    Published 2012
    “…The focus on LPC-10 was implemented on the DSP board TMS320C6713 to test the LPC-10 algorithm in realtime. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Efficient task scheduling strategies using symbiotic organisms search algorithm for cloud computing environment by Sa'ad, Suleiman

    Published 2022
    “…However, the efficiency of the clouds drops as the size of the search space gets larger, like in the case of most metaheuristic optimisation algorithms. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Effects of Authentication of Users in Mobile Internet Protocol Version 6 by Obenofunde, Simon Tabi

    Published 2004
    “…The password system is also recommended as a viable solution for this authentication as its implementation is most convenient for mobile users. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Investigation of maximum power point tracking (MPPT) for active cooling mono-crystalline photovoltaic panel using fuzzy logic controller by Nurul Afiqah, Zainal

    Published 2017
    “…This clearly shows the Vpv produce depends on the PV temperature. By implementing FL based CV algorithm into this method, it makes the system more robust and reliable in terms of effectiveness and efficiency. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A high-performance control scheme for photovoltaic pumping system under sudden irradiance and load changes by Talbi, Billel, Krim, Fateh, Rekioua, Toufik, Mekhilef, Saad, Laib, Abdelbaset, Belaout, Abdesslam

    Published 2018
    “…Moreover, predictive torque and flux control (PTC) is used to control IM drive, due to its advantages such as faster torque response, lower torque ripple, and simplicity of implementation. …”
    Get full text
    Get full text
    Article
  17. 17

    A new countermeasure to combat the embedding-based attacks on the goldreich-goldwasser-halevi lattice-based cryptosystem by Arif Mandangan, Nazreen Syazwina Nazaruddin, Muhammad Asyraf Asbullah, Hailiza Kamarulhaili, Che Haziqah Che Hussin, Babarinsa Olayiwola

    Published 2024
    “…Consequently, the simplified CVP can be reduced to a Shortest-Vector Problem (SVP) variant which can be solved by using lattice-reduction algorithms such as the LLL algorithm in a shorter amount of time. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    A new countermeasure to combat the embedding-based attacks on the Goldreich-Goldwasser-Halevi lattice-based cryptosystem by Mandangan, Arif, Nazaruddin, Nazreen Syazwina, Asbullah, Muhammad Asyraf, Kamarulhaili, Hailiza, Che Hussin, Che Haziqah, Olayiwola, Babarinsa

    Published 2024
    “…Consequently, the simplified CVP can be reduced to a Shortest-Vector Problem (SVP) variant which can be solved by using lattice-reduction algorithms such as the LLL algorithm in a shorter amount of time. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Efficient radio resource management algorithms for downlink long term evolution networks by Mamman, Maharazu

    Published 2018
    “…Secondly, the proposed call admission control algorithm improved the resource utilization algorithm thus reducing the call block, call dropped, call degradation. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Fractal coding of bio-metric image for face authentication by Ahadullah, Md

    Published 2021
    “…This thesis examines how fractal image coding is used in biometric cryptography for personal face authentication. This thesis implements the algorithms for the Methods of CPM, BPBM fractal coding, and its application. …”
    Get full text
    Get full text
    Thesis