Search Results - (( java implementation path algorithm ) OR ( based verification means algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Non-fiducial based electrocardiogram biometrics with kernel methods by Hejazi, Maryamsadat

    Published 2017
    “…The effectiveness of this algorithm is investigated by comparing with other AC based feature extraction algorithms involving AC/LDA (Linear Discriminant Analysis) and AC/PCA (Principal Component Analysis). …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Contactless palmprint verification using siamese networks by Ng, Jan Hui

    Published 2022
    “…Biometric based identification technology can be seen taking multiple forms. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    A Novel Approach Of Groebner Bases Computation For Safety Analysis Of Distributed Discrete Controllers by Alwi @ Suhaimi, Saifulza, Salleh, Mohd Rizal, Jaafar, Hazriq Izzuan, Ab Ghani, Mohd Ruddin, Md Fauadi, Muhammad Hafidz Fazli

    Published 2019
    “…At the end of this research, a complete tool of model checking method based on Groebner bases algorithm for safety verification will be produced. …”
    Get full text
    Get full text
    Get full text
    Technical Report
  10. 10

    Numerical simulation and experimental verification on distortions induced by wire-arc additive manufacturing components and costing analysis / Keval Priapratama Prajadhiana by Prajadhiana, Keval Priapratama

    Published 2024
    “…This thesis focuses on the substrate and part distortion induced by wire arc additive manufacturing (WAAM) which is predicted by means of numerical computation followed by experimental verification. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A comparison of discrete cosine transform and discrete wavelet transform algorithm in watermarking against common attacks by Said, Mohamed Abdisalan

    Published 2015
    “…In this report, the DCT watermarking algorithms and DWT watermarking algorithms were compared based on robustness and imperceptibility criteria. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Hand, Foot and Mouth Disease (HFMD)'s Hotspot Identification using Bipartite Network Model by Nor Shamira, Sabri

    Published 2020
    “…The location node ranked based on the vector density of the disease. Verification analysis with a root mean square error (RMSE) value of 0.000564 and 0.000812 for location and human nodes respectively, which is much lower than threshold value of 0.05. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  13. 13

    User authentication using neural network in smart home by Jee,, Tze Ling

    Published 2009
    “…Conventional password-based authentication methods store passwords as a password or verification table which is vulnerable. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  14. 14

    Coastal Priority Ranking in Oil Spill Response Decision Support Mechanism by Pourvakhshouri, Seyedeh Zahra

    Published 2008
    “…Results were verified to present the inclusiveness, accuracy, and system algorithm. The verification activity involved exploring the knowledge base, coding of reasoning processes / inference engine, technical performance, ability for development, and interface. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Signal quality measures for unsupervised blood pressure measurement by Abdul Sukora, Jumadi, Redmond, S J, Chan, G S H, Lovell, N H

    Published 2012
    “…The mean systolic and diastolic differences were 0.37 ± 3.31 and 3.10 ± 5.46 mmHg, respectively, when the artifact detection algorithm was utilized, with the algorithm correctly determined if the signal was clean enough to attempt an estimation of systolic or diastolic pressures in 93% of blood pressure measurements.…”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…Then, a stopping rule for the cluster tree based on the mean direction and circular standard deviation of the tree height is proposed. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm by Nur Alya Afikah, Usop

    Published 2024
    “…The effectiveness of the algorithm has been established since it uses an image-based approach after conversion between document and images with a numbering pattern that is fragile to deletion, replacement, insertion, combine, and copy attack. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Fuzzy-Pid Based Controler For Active Vibration Control Of Nonlinear Dynamic Systems by Annisa, Jamali, Muhammad Sukri, Hadi, Hanim, Mohd Yatim, Mat Hussin, Ab Talib, Intan Zaurah, Mat Darus

    Published 2019
    “…The vibration data obtained experimentally was used to model the dynamic system based on auto-regressive with exogenous input structure using evolutionary swarm algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding