Search Results - (( java application using algorithm ) OR ( using active ((search algorithm) OR (path algorithm)) ))

Refine Results
  1. 1

    Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed by Aneesa Ali, Ali Saeed

    Published 2017
    “…A model-driven approach was used for generating abstract test cases from the feasible paths. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Hybrid genetic algorithm with multi-parents recombination for job shop scheduling problems / Ong Chung Sin by Ong, Chung Sin

    Published 2013
    “…Modification on the path by using neighborhood search significantly reduces the total length of the makespan. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Review of Nature Inspired Metaheuristic Algorithm Selection for Combinatorial t-way Testing by Muazu, A.A., Hashim, A.S., Sarlan, A.

    Published 2022
    “…This research paper outlines hundred and ten (110) outstanding nature-inspired metaheuristic algorithms for the last decades (2001 and 2021) such as Coronavirus Optimization Algorithm, Ebola Optimization Algorithm, Harmony Search, Tiki-Taka Algorithm, and so on. …”
    Get full text
    Get full text
    Article
  6. 6

    Tracking of EEG Activity Using Motion Estimation to Understand Brain Wiring by Nisar, Humaira, Malik, Aamir Saeed, Ullah, Rafi, Shim, Seongo, Bawakid, Abdullah, Khan, Muhammad Burhan, Subhani, Rauf

    Published 2014
    “…Using motion estimation it is possible to track the path from the starting point of activation to the final point of activation. …”
    Get full text
    Get full text
    Citation Index Journal
  7. 7
  8. 8
  9. 9

    Design of A unmanned aerial vehicles assisted search and rescue collaboration architecture for emergency communication systems / Abdu Ahmed Saif Ahmed by Abdu Ahmed , Saif Ahmed

    Published 2022
    “…This thesis addresses these issues by studying a theoretical framework for designing and analyzing emergency communication system (ECS) algorithms for post-disaster recovery. UAVs are increasingly valuable to assist ECS and search and rescue (SAR) teams in multiple disaster management operations to increase disaster response effectiveness. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    A Continuous Overlay Path Probing Algorithm For Overlay Networks by Feily, Maryam

    Published 2013
    “…The primary idea is to perform active measurements using the applications’ packets instead of using extra probe packets. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Nonlinear FXLMS algorithm for active noise control systems with saturation nonlinearity by Sahib, Mouayad A., Raja Ahmad, Raja Mohd Kamil, Marhaban, Mohammad Hamiruce

    Published 2012
    “…In active noise control (ANC) applications, the saturation effect of the loudspeaker in the secondary path is considered as the most serious problem that could degrade performance of standard filtered-x least mean square (FXLMS) control algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Path Planning and Control of Mobile Robot in Road Environments using Sensor Fusion and Active Force Control by Ali, Mohammed A. H., Mailah, Musa

    Published 2018
    “…The sensor fusion algorithm is used to remove noises and uncertainties from sensors' data and provide optimum measurements for path planning. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Nonlinear adaptive algorithm for active noise control with loudspeaker nonlinearity by Dehkordi, Sepehr Ghasemi

    Published 2014
    “…The proposed THF-NLFXLMS algorithm models the Wiener secondary path and applies the estimated degree of nonlinearity of the nonlinear secondary path in the control algorithm design. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    An application of Floyd-Warshall Algortihm in finding shortest path of order picker in warehouse / Saidatul Aisyah Roslan, Siti Norhakimah Mohd Yatim and Siti Sarah Sulaiman by Roslan, Saidatul Aisyah, Mohd Yatim, Siti Norhakimah, Sulaiman, Siti Sarah

    Published 2019
    “…For the result, shortest path for the order pickers in iterations. The algorithm used can help the order picker to have the shortest path, but it have no direct path. …”
    Get full text
    Get full text
    Student Project
  18. 18

    The swarm-based exploration algorithm with expanded circle pattern for searching activities by Zuhri, Muhammad Fuad Reza, Zahari, Ammar, Desia, Recky, Ismail , Amelia Ritahani, Al Haek, Mohammed

    Published 2015
    “…In this paper, we propose an exploration algorithm using quadcopter in simulation to discover an unknown area that is based on the expanding circle pattern for searching activities. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  20. 20