Search Results - (( java implementation path algorithm ) OR ( based information needs algorithm ))

Refine Results
  1. 1

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Afterward evolutionary algorithm (EA) was employed to prioritize test cases based on the rate severity of fault detection per unit test cost. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Implementation of AES algorithm into information investigation autopsy (IIA) / Ahmad Wafiy Hamad Zaki by Hamad Zaki, Ahmad Wafiy Hamad Zaki

    Published 2013
    “…Information Investigation Autopsy (IIA) is the tools that can captured the information needed on the Local Area Network environment and later needed to be secured, the IIA need a module that can to secure the evidence captured from any harm. …”
    Get full text
    Get full text
    Student Project
  7. 7
  8. 8

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…The tool is used to evaluate the accuracy of the proposed extraction algorithm to extract the appropriate information which are needed. …”
    Get full text
    Get full text
    Thesis
  9. 9

    TRIP PLANNER MOBILE APPLICATION FOR SARAWAK TOURIST WITH USING INTELLIGENT AGENT BASED DECISION MAKING ALGORITHMS by Teh, Khee Shin

    Published 2020
    “…Nowadays, technology has become an essential need in almost every aspect of our lives. The internet becomes the main source of information for user to plan the trip. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  10. 10

    What drives Chinese youth to use fitness-related health information on social media? an analysis of intrinsic needs, social media algorithms, and source credibility by Zhang, Xin, Tang, Qing Qing, Cai, Ying Ying

    Published 2024
    “…Additionally, social media algorithms moderated the relationship between the need for relatedness and fitness-related health information behavior. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Influence maximisation towards target users and minimal diffusion of information based on information needs by Temitope, Olanrewaju Abdus-Samad

    Published 2020
    “…This study proposes the Information Diffusion towards Target Users (IDTU) algorithm to enhance influencer selection while minimizing the DC. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection by Siswanto, Apri, Katuk, Norliza, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Mobile Map-Based Positioning System Using Segmentation Algorithm (MM-BPS) by Migdady, Hazem Moh'd Ali

    Published 2008
    “…This paper reports steps to build a segmentation positioning algorithm and to implement Mobile Map-Based Positioning System prototype.…”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Adaptive firefly algorithm for hierarchical text clustering by Mohammed, Athraa Jasim

    Published 2016
    “…In order to refine the obtained clusters, a second algorithm, termed as Weight-based Firefly Algorithm with Relocate (WFAR), is proposed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Relationship based replication algorithm for data grid by Yusof, Yuhanis

    Published 2014
    “…Such an approach overcomes existing algorithms that is based either on users request or resource capabilities as an individual. …”
    Get full text
    Get full text
    Monograph
  18. 18
  19. 19
  20. 20