Search Results - (( java implementation path algorithm ) OR ( attack interaction study algorithm ))

  • Showing 1 - 12 results of 12
Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A survey of interest flooding attack in named-data networking: Taxonomy, performance and future research challenges by Ren-Ting Lee, Yu-Beng Leau, Yong Jin Park, Mohammed Anbar

    Published 2021
    “…In this paper, we sum- maize the different types of possible attack models with a specific name with a description in NDN, specifically the PIT-oriented routing attack. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    CNN-LSTM: hybrid deep neural network for network intrusion detection system; a case by Halbouni, Asmaa Hani, Gunawan, Teddy Surya, Habaebi, Mohamed Hadi, Halbouni, Murad, Kartiwi, Mira, Ahmad, Robiah

    Published 2022
    “…Network security becomes indispensable to our daily interactions and networks. As attackers continue to develop new types of attacks and the size of networks continues to grow, the need for an effective intrusion detection system has become critical. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    ECG encryption enhancement with multi-layers of AES and DNA computing by Kh-Madhloom, Jamal

    Published 2023
    “…Evaluations of algorithms reveal that the proposed algorithm has achieved a level of security and complexity that is 48 times superior to that of other methods that have been tried and tested. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Enhanced recognition methods for text and slider CAPTCHA vulnerability assessment by Xing, Wan

    Published 2025
    “…By comparing them with the benchmark models in terms of recognition accuracy, precision, computational complexity, storage space, and other metrics, the superiority of our proposed algorithm is proved. Furthermore, we have delineated the path for subsequent study and enhancement.…”
    Get full text
    Get full text
    Thesis
  10. 10

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Enhancing user authentication through the implementation of the ForestPA algorithm for smart healthcare systems by Nurul Syafiqah, Zaidi, Al Fahim, Mubarak Ali, Ahmad Firdaus, Zainal Abidin, Ibrahim, Adamu Abubakar, Aldharhani, Ghassan Saleh, Mohd Faizal, Ab Razak

    Published 2025
    “…This study involves five participants with devices and performs various finger-based interactions (raising, lowering, moving the finger, applying pressure, adjusting orientation, and utilizing multiple hikes) while completing reading and image comparison tasks across multiple sessions. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Enhancing user authentication through the implementation of the ForestPA algorithm for smart healthcare systems by Zaidi, Nurul Syafiqah, Mubarak Ali, Al-Fahim, Ahmad, Firdaus, Abubakar, Adamu, AlDharhani, Ghassan Saleh, Ab Razak, Mohd Faizal

    Published 2025
    “…This study involves five participants with devices and performs various finger-based interactions (raising, lowering, moving the finger, applying pressure, adjusting orientation, and utilizing multiple hikes) while completing reading and image comparison tasks across multiple sessions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article